We put forth a new notion of distributed public key functional encryption. In such a functional encryption scheme, the secret key for a function $f$ will be split into shares $sk_i^f$. Given a ciphertext $ct$ that encrypts a message $x$, a secret key share $sk_i^f$, one can evaluate and obtain a shared value $y_i$. Adding all the shares up can recover the actual value of $f(x)$, while partial shares reveal nothing about the plaintext. More importantly, this new model allows us to establish {\em function privacy} which was not possible in the setting of regular public key functional encryption. We formalize such notion and construct such a scheme from any public key functional encryption scheme together with learning with error assumption. ...
Our work revisits public-key encryption in two ways: 1) we provide a stronger security guarantee tha...
Abstract. Running the key-management service of cryptographic sys-tems in the cloud is an attractive...
Classical cryptographic primitives do not allow for any fine-grained access control over encrypted ...
We introduce a novel notion of distributed functional signature. In such a signature scheme, the sig...
Our work revisits public-key encryption in two ways: 1) we provide a stronger security guarantee tha...
Functional encryption supports restricted decryption keys that allow users to learn specic functions...
peer reviewedIn the public-key setting, known constructions of function-private functional encryptio...
Functional encryption (FE) is a generalization of many commonly employed crypto- graphic primitives,...
Confidentiality can be usually achieved by conventional encryption, which hides sensitive data from ...
In the public-key setting, known constructions of function-private functional encryption (FPFE) were...
In the public-key setting, known constructions of functionprivate functional encryption (FPFE) were ...
With organizations increasingly willing to outsource their network functions (e.g., firewalls, traff...
Functional encryption is an emerging paradigm for public-key encryption that enables fine-grained co...
We present a new class of public-key predicate encryption schemes that are provably function private...
We present a construction of a private-key functional encryption scheme for any family of randomized...
Our work revisits public-key encryption in two ways: 1) we provide a stronger security guarantee tha...
Abstract. Running the key-management service of cryptographic sys-tems in the cloud is an attractive...
Classical cryptographic primitives do not allow for any fine-grained access control over encrypted ...
We introduce a novel notion of distributed functional signature. In such a signature scheme, the sig...
Our work revisits public-key encryption in two ways: 1) we provide a stronger security guarantee tha...
Functional encryption supports restricted decryption keys that allow users to learn specic functions...
peer reviewedIn the public-key setting, known constructions of function-private functional encryptio...
Functional encryption (FE) is a generalization of many commonly employed crypto- graphic primitives,...
Confidentiality can be usually achieved by conventional encryption, which hides sensitive data from ...
In the public-key setting, known constructions of function-private functional encryption (FPFE) were...
In the public-key setting, known constructions of functionprivate functional encryption (FPFE) were ...
With organizations increasingly willing to outsource their network functions (e.g., firewalls, traff...
Functional encryption is an emerging paradigm for public-key encryption that enables fine-grained co...
We present a new class of public-key predicate encryption schemes that are provably function private...
We present a construction of a private-key functional encryption scheme for any family of randomized...
Our work revisits public-key encryption in two ways: 1) we provide a stronger security guarantee tha...
Abstract. Running the key-management service of cryptographic sys-tems in the cloud is an attractive...
Classical cryptographic primitives do not allow for any fine-grained access control over encrypted ...