In multi-client functional encryption (MC-FE) for predicate queries, clients generate ciphertexts of attributes $x_1, \ldots, x_n$ binding with a time period $T$ and store them on a cloud server, and the cloud server receives a token corresponding to a predicate $f$ from a trusted center and learns whether $f(x_1, \ldots, x_n) = 1$ or not by running the query algorithm on the multiple ciphertexts of the same time period. MC-FE for predicates can be used for a network event or medical data monitoring system based on time series data gathered by multiple clients. In this paper, we propose efficient MC-FE schemes that support conjunctive equality or range queries on encrypted data in the multi-client settings. First, we propose an efficient mu...
International audienceJoint computation on encrypted data is becoming increasingly crucial with the ...
Predicate encryption (PE) is a new primitive which supports exible control over access to encrypte...
In predicate encryption, a ciphertext is associated with descriptive attribute values x in addition ...
We propose the first multi-client predicate-only encryption scheme capable of efficiently testing th...
We propose the first multi-client predicate-only encryption scheme capable of efficiently testing th...
Multi-client functional encryption (MC-FE) is a powerful concept that makes it possible to compute o...
Accepted paper for the 12TH CONFERENCE ON SECURITY AND CRYPTOGRAPHY FOR NETWORKS [Abstract] Multi-c...
Hidden Vector Encryption (HVE) is a special type of predicate encryption that can support conjunctiv...
Hidden vector encryption (HVE), introduced by Boneh and Waters in TCC\u2707, is an expressive sub-cl...
textWe develop the dual system encryption methodology to provide fully secure functional encryption ...
Functional encryption, which emerges in the community recently, is a generalized concept of traditi...
Multi-input functional encryption (MIFE) was introduced by Goldwasser \emph{et al.} (EUROCRYPT 2014)...
We construct a functional encryption scheme secure against an a priori bounded polynomial number of ...
This work presents the design, analysis and implementation of the first sub-linear searchable symmet...
We introduce the problem of Multi-Input Functional Encryption, where a secret key SKf can correspond...
International audienceJoint computation on encrypted data is becoming increasingly crucial with the ...
Predicate encryption (PE) is a new primitive which supports exible control over access to encrypte...
In predicate encryption, a ciphertext is associated with descriptive attribute values x in addition ...
We propose the first multi-client predicate-only encryption scheme capable of efficiently testing th...
We propose the first multi-client predicate-only encryption scheme capable of efficiently testing th...
Multi-client functional encryption (MC-FE) is a powerful concept that makes it possible to compute o...
Accepted paper for the 12TH CONFERENCE ON SECURITY AND CRYPTOGRAPHY FOR NETWORKS [Abstract] Multi-c...
Hidden Vector Encryption (HVE) is a special type of predicate encryption that can support conjunctiv...
Hidden vector encryption (HVE), introduced by Boneh and Waters in TCC\u2707, is an expressive sub-cl...
textWe develop the dual system encryption methodology to provide fully secure functional encryption ...
Functional encryption, which emerges in the community recently, is a generalized concept of traditi...
Multi-input functional encryption (MIFE) was introduced by Goldwasser \emph{et al.} (EUROCRYPT 2014)...
We construct a functional encryption scheme secure against an a priori bounded polynomial number of ...
This work presents the design, analysis and implementation of the first sub-linear searchable symmet...
We introduce the problem of Multi-Input Functional Encryption, where a secret key SKf can correspond...
International audienceJoint computation on encrypted data is becoming increasingly crucial with the ...
Predicate encryption (PE) is a new primitive which supports exible control over access to encrypte...
In predicate encryption, a ciphertext is associated with descriptive attribute values x in addition ...