International audienceInner product functional encryption (IPFE) [1] is a popular primitive which enables inner product computations on encrypted data. In IPFE, the ciphertext is associated with a vector x, the secret key is associated with a vector y and decryption reveals the inner product x, y. Previously, it was known how to achieve adaptive indistinguishability (IND) based security for IPFE from the DDH, DCR and LWE assumptions [8]. However, in the stronger simulation (SIM) based security game, it was only known how to support a restricted adversary that makes all its key requests either before or after seeing the challenge ciphertext, but not both. In more detail, Wee [46] showed that the DDH-based scheme of Agrawal et al. (Crypto 201...
peer reviewedIn a seminal work, Boneh, Sahai and Waters (BSW, for short) [TCC'11] showed that for fu...
Functional encryption is a new public key paradigm that solves, in a non-interactive way, most of th...
International audienceFunctional Encryption (FE) has been widely studied in the last decade, as it p...
International audienceInner product functional encryption (IPFE) [1] is a popular primitive which en...
This work attempts to clarify to what extent simulation-based security (SIM-security) is achievable ...
International audienceFunctional encryption is a modern public-key paradigm where a master secret ke...
International audienceInner product functional encryption (IPFE) is a primitive which produces, from...
Inner product functional encryption (IPFE), introduced by Abdalla et al. (PKC2015), is a kind of fun...
In the recent years, many research lines on Functional Encryption (FE) have been suggested and stud...
In recent years, there has been great interest in Functional Encryption (FE), a gener-alization of t...
International audienceIn an inner-product functional encryption scheme, the plaintexts are vectors a...
International audienceWe present a new generic construction of multi-client functional encryption (M...
The classic work of Gorbunov, Vaikuntanathan and Wee (CRYPTO 2012) and follow-ups provided construct...
peer reviewedOne of the main lines of research in functional encryption (FE) has consisted in studyi...
International audienceFunctional encryption is a modern public-key cryptographic primitive allowing ...
peer reviewedIn a seminal work, Boneh, Sahai and Waters (BSW, for short) [TCC'11] showed that for fu...
Functional encryption is a new public key paradigm that solves, in a non-interactive way, most of th...
International audienceFunctional Encryption (FE) has been widely studied in the last decade, as it p...
International audienceInner product functional encryption (IPFE) [1] is a popular primitive which en...
This work attempts to clarify to what extent simulation-based security (SIM-security) is achievable ...
International audienceFunctional encryption is a modern public-key paradigm where a master secret ke...
International audienceInner product functional encryption (IPFE) is a primitive which produces, from...
Inner product functional encryption (IPFE), introduced by Abdalla et al. (PKC2015), is a kind of fun...
In the recent years, many research lines on Functional Encryption (FE) have been suggested and stud...
In recent years, there has been great interest in Functional Encryption (FE), a gener-alization of t...
International audienceIn an inner-product functional encryption scheme, the plaintexts are vectors a...
International audienceWe present a new generic construction of multi-client functional encryption (M...
The classic work of Gorbunov, Vaikuntanathan and Wee (CRYPTO 2012) and follow-ups provided construct...
peer reviewedOne of the main lines of research in functional encryption (FE) has consisted in studyi...
International audienceFunctional encryption is a modern public-key cryptographic primitive allowing ...
peer reviewedIn a seminal work, Boneh, Sahai and Waters (BSW, for short) [TCC'11] showed that for fu...
Functional encryption is a new public key paradigm that solves, in a non-interactive way, most of th...
International audienceFunctional Encryption (FE) has been widely studied in the last decade, as it p...