International audienceJoint computation on encrypted data is becoming increasingly crucial with the rise of cloud computing. In recent years, the development of multi-client functional encryption (MCFE) has made it possible to perform joint computation on private inputs, without any interaction. Well-settled solutions for linear functions have become efficient and secure, but there is still a shortcoming: if one user inputs incorrect data, the output of the function might become meaningless for all other users (while still useful for the malicious user). To address this issue, the concept of verifiable functional encryption was introduced by Badrinarayanan et al. at Asiacrypt '16 (BGJS). However, their solution was impractical because of st...
We introduce the problem of Multi-Input Functional Encryption, where a secret key SKf can correspond...
Secure multiparty computation enables a set of users to evaluate certain functionalities on their re...
In many application scenarios, data need to be collected, stored and processed. Often sensitive data...
International audienceWe consider a situation where multiple parties, owning data that have to be fr...
Accepted paper for the 12TH CONFERENCE ON SECURITY AND CRYPTOGRAPHY FOR NETWORKS [Abstract] Multi-c...
Choi et al. (TCC 2013) introduced the notion of multi-client verifiable computation (MVC) in which a...
International audienceMulti-client functional encryption (MCFE) is a more flexible variant of functi...
Multi-client functional encryption (MC-FE) is a powerful concept that makes it possible to compute o...
Accepted paper for the CRYPTO 2020 conference [Abstract] We introduce Dynamic Decentralized Functio...
International audienceWe present a new generic construction of multi-client functional encryption (M...
International audienceMulti-Client Functional Encryption (MCFE) and Multi-Input Functional Encryptio...
In a Multi-Input Functional Encryption (MIFE) scheme, n clients each obtain a secret encryption key ...
The notion of multi-input functional encryption (MI-FE) was recently introduced by Goldwasser et al....
International audienceResearch on (Decentralized) Multi-Client Functional Encryption (or (D)MCFE) is...
Classical cryptographic primitives do not allow for any fine-grained access control over encrypted ...
We introduce the problem of Multi-Input Functional Encryption, where a secret key SKf can correspond...
Secure multiparty computation enables a set of users to evaluate certain functionalities on their re...
In many application scenarios, data need to be collected, stored and processed. Often sensitive data...
International audienceWe consider a situation where multiple parties, owning data that have to be fr...
Accepted paper for the 12TH CONFERENCE ON SECURITY AND CRYPTOGRAPHY FOR NETWORKS [Abstract] Multi-c...
Choi et al. (TCC 2013) introduced the notion of multi-client verifiable computation (MVC) in which a...
International audienceMulti-client functional encryption (MCFE) is a more flexible variant of functi...
Multi-client functional encryption (MC-FE) is a powerful concept that makes it possible to compute o...
Accepted paper for the CRYPTO 2020 conference [Abstract] We introduce Dynamic Decentralized Functio...
International audienceWe present a new generic construction of multi-client functional encryption (M...
International audienceMulti-Client Functional Encryption (MCFE) and Multi-Input Functional Encryptio...
In a Multi-Input Functional Encryption (MIFE) scheme, n clients each obtain a secret encryption key ...
The notion of multi-input functional encryption (MI-FE) was recently introduced by Goldwasser et al....
International audienceResearch on (Decentralized) Multi-Client Functional Encryption (or (D)MCFE) is...
Classical cryptographic primitives do not allow for any fine-grained access control over encrypted ...
We introduce the problem of Multi-Input Functional Encryption, where a secret key SKf can correspond...
Secure multiparty computation enables a set of users to evaluate certain functionalities on their re...
In many application scenarios, data need to be collected, stored and processed. Often sensitive data...