Thesis: M. Eng. in Computer Science and Engineering, Massachusetts Institute of Technology, Department of Electrical Engineering and Computer Science, 2016.This electronic version was submitted by the student author. The certified thesis is available in the Institute Archives and Special Collections.Cataloged from student-submitted PDF version of thesis.Includes bibliographical references (pages 95-102).In functional encryption, keys are associated with functions, and ciphertexts with messages. Decrypting a message with a key gives the evaluation of the associated function on that message. We look at bounded-collusion functional encryption, where the number of keys for which security is guaranteed is bounded, as it is possible to realize u...
Classical cryptographic primitives do not allow for any fine-grained access control over encrypted ...
Functional encryption provides fine-grained access control for encrypted data, allowing each user to...
In the public-key setting, known constructions of function-private functional encryption (FPFE) were...
Functional encryption is an emerging paradigm for public-key encryption that enables fine-grained co...
Our work revisits public-key encryption in two ways: 1) we provide a stronger security guarantee tha...
Confidentiality can be usually achieved by conventional encryption, which hides sensitive data from ...
Functional encryption supports restricted decryption keys that allow users to learn specic functions...
3École polytechnique fédérale de Lausanne Motivated by privacy and usability requirements in various...
The classic work of Gorbunov, Vaikuntanathan and Wee (CRYPTO 2012) and follow-ups provided construct...
We construct a functional encryption scheme secure against an a priori bounded polynomial number of ...
Abstract. Cryptography is the science of information and communica-tion security. Up to now, for eff...
In the public-key setting, known constructions of functionprivate functional encryption (FPFE) were ...
Abstract. Functional encryption (FE) enables fine-grained access con-trol of encrypted data while pr...
Functional encryption provides fine-grained access control for encrypted data, allowing each user to...
peer reviewedIn the public-key setting, known constructions of function-private functional encryptio...
Classical cryptographic primitives do not allow for any fine-grained access control over encrypted ...
Functional encryption provides fine-grained access control for encrypted data, allowing each user to...
In the public-key setting, known constructions of function-private functional encryption (FPFE) were...
Functional encryption is an emerging paradigm for public-key encryption that enables fine-grained co...
Our work revisits public-key encryption in two ways: 1) we provide a stronger security guarantee tha...
Confidentiality can be usually achieved by conventional encryption, which hides sensitive data from ...
Functional encryption supports restricted decryption keys that allow users to learn specic functions...
3École polytechnique fédérale de Lausanne Motivated by privacy and usability requirements in various...
The classic work of Gorbunov, Vaikuntanathan and Wee (CRYPTO 2012) and follow-ups provided construct...
We construct a functional encryption scheme secure against an a priori bounded polynomial number of ...
Abstract. Cryptography is the science of information and communica-tion security. Up to now, for eff...
In the public-key setting, known constructions of functionprivate functional encryption (FPFE) were ...
Abstract. Functional encryption (FE) enables fine-grained access con-trol of encrypted data while pr...
Functional encryption provides fine-grained access control for encrypted data, allowing each user to...
peer reviewedIn the public-key setting, known constructions of function-private functional encryptio...
Classical cryptographic primitives do not allow for any fine-grained access control over encrypted ...
Functional encryption provides fine-grained access control for encrypted data, allowing each user to...
In the public-key setting, known constructions of function-private functional encryption (FPFE) were...