Function-Private Functional Encryption in the Private-Key Setting
نویسندگان
چکیده
منابع مشابه
On the Power of Public-key Function-Private Functional Encryption
In the public-key setting, known constructions of functionprivate functional encryption (FPFE) were limited to very restricted classes of functionalities like inner-product [Agrawal et al. PKC 2015]. Moreover, its power has not been well investigated. In this paper, we construct FPFE for general functions and explore its powerful applications, both for general and specific functionalities. As w...
متن کاملFrom Single-Input to Multi-Input Functional Encryption in the Private-Key Setting
We construct a general-purpose multi-input functional encryption scheme in the private-key setting. Namely, we construct a scheme where a functional key corresponding to a function f enables a user holding encryptions of x1, . . . , xt to compute f(x1, . . . , xt) but nothing else. Our construction assumes any general-purpose private-key single-input scheme (without any additional assumptions),...
متن کاملEncrypt-Augment-Recover: Function Private Predicate Encryption from Minimal Assumptions in the Public-Key Setting
We present new public-key predicate encryption schemes in the standard model that are provably function private under standard computational assumptions. A large class of existing function private constructions in the public-key setting impose highly stringent requirements on the min-entropy of predicate distributions, thereby limiting their applicability in the context of realworld predicates....
متن کاملEmbed-Augment-Recover: Function Private Predicate Encryption from Minimal Assumptions in the Public-Key Setting
We present a new class of public-key predicate encryption schemes that are provably function private in the standard model under well-known cryptographic assumptions, and assume predicate distributions satisfying realistic min-entropy requirements. More concretely, we present public-key constructions for identity-based encryption (IBE) and inner-product encryption (IPE) that are computationally...
متن کاملKey-Private Proxy Re-encryption
Proxy re-encryption (PRE) allows a proxy to convert a ciphertext encrypted under one key into an encryption of the same message under another key. The main idea is to place as little trust and reveal as little information to the proxy as necessary to allow it to perform its translations. At the very least, the proxy should not be able to learn the keys of the participants or the content of the ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of Cryptology
سال: 2017
ISSN: 0933-2790,1432-1378
DOI: 10.1007/s00145-017-9255-y