Functional encryption
- 1 November 2012
- journal article
- Published by Association for Computing Machinery (ACM) in Communications of the ACM
- Vol. 55 (11), 56-64
- https://doi.org/10.1145/2366316.2366333
Abstract
Decryption keys allow users to learn a specific function of the encrypted data and nothing else.Keywords
This publication has 18 references indexed in Scilit:
- Functional Encryption for Inner Product Predicates from Learning with ErrorsLecture Notes in Computer Science, 2011
- Computing arbitrary functions of encrypted dataCommunications of the ACM, 2010
- Fully Secure Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner Product EncryptionLecture Notes in Computer Science, 2010
- Efficient Lattice (H)IBE in the Standard ModelLecture Notes in Computer Science, 2010
- Dual System Encryption: Realizing Fully Secure IBE and HIBE under Simple AssumptionsLecture Notes in Computer Science, 2009
- Practical Identity-Based Encryption Without Random OraclesLecture Notes in Computer Science, 2006
- Efficient Identity-Based Encryption Without Random OraclesLecture Notes in Computer Science, 2005
- Fuzzy Identity-Based EncryptionLecture Notes in Computer Science, 2005
- How to play ANY mental gamePublished by Association for Computing Machinery (ACM) ,1987
- New directions in cryptographyIEEE Transactions on Information Theory, 1976