The notion of multi-input functional encryption (MI-FE) was recently introduced by Goldwasser et al. [EUROCRYPT’14] as a means to non-interactively compute aggregate information on the joint private data of multiple users. A fundamental limitation of their work, however, is that the total number of users (which corresponds to the arity of the functions supported by the MI-FE scheme) must be a priori bounded and fixed at the system setup time. In this work, we overcome this limitation by introducing the notion of unbounded input MI-FE that supports the computation of functions with unbounded arity. We construct such an MI-FE scheme with indistinguishability security in the selective model based on the existence of public-coin differing-input...
Multi-client functional encryption (MC-FE) is a powerful concept that makes it possible to compute o...
Secure multiparty computation enables a set of users to evaluate certain functionalities on their re...
In a Functional Encryption scheme (FE), a trusted authority enables designated parties to compute sp...
Abstract. The notion of multi-input functional encryption (MI-FE) was recently introduced by Goldwas...
Multi-input functional encryption (MIFE) was introduced by Goldwasser \emph{et al.} (EUROCRYPT 2014)...
International audienceMulti-Client Functional Encryption (MCFE) and Multi-Input Functional Encryptio...
Consider sources that supply sensitive data to an aggregator. Standard encryption only hides the dat...
We introduce the problem of Multi-Input Functional Encryption, where a secret key SKf can correspond...
Functional encryption (FE) is a powerful primitive enabling fine-grained access to encrypted data. I...
The arrival of indistinguishability obfuscation (iO) has transformed the cryptographic land-scape by...
International audienceJoint computation on encrypted data is becoming increasingly crucial with the ...
In a Multi-Input Functional Encryption (MIFE) scheme, n clients each obtain a secret encryption key ...
Classical cryptographic primitives do not allow for any fine-grained access control over encrypted ...
Copyright © by SIAM. We propose a new notion of secure multiparty computation aided by a computation...
We construct a functional encryption scheme secure against an a priori bounded polynomial number of ...
Multi-client functional encryption (MC-FE) is a powerful concept that makes it possible to compute o...
Secure multiparty computation enables a set of users to evaluate certain functionalities on their re...
In a Functional Encryption scheme (FE), a trusted authority enables designated parties to compute sp...
Abstract. The notion of multi-input functional encryption (MI-FE) was recently introduced by Goldwas...
Multi-input functional encryption (MIFE) was introduced by Goldwasser \emph{et al.} (EUROCRYPT 2014)...
International audienceMulti-Client Functional Encryption (MCFE) and Multi-Input Functional Encryptio...
Consider sources that supply sensitive data to an aggregator. Standard encryption only hides the dat...
We introduce the problem of Multi-Input Functional Encryption, where a secret key SKf can correspond...
Functional encryption (FE) is a powerful primitive enabling fine-grained access to encrypted data. I...
The arrival of indistinguishability obfuscation (iO) has transformed the cryptographic land-scape by...
International audienceJoint computation on encrypted data is becoming increasingly crucial with the ...
In a Multi-Input Functional Encryption (MIFE) scheme, n clients each obtain a secret encryption key ...
Classical cryptographic primitives do not allow for any fine-grained access control over encrypted ...
Copyright © by SIAM. We propose a new notion of secure multiparty computation aided by a computation...
We construct a functional encryption scheme secure against an a priori bounded polynomial number of ...
Multi-client functional encryption (MC-FE) is a powerful concept that makes it possible to compute o...
Secure multiparty computation enables a set of users to evaluate certain functionalities on their re...
In a Functional Encryption scheme (FE), a trusted authority enables designated parties to compute sp...