搜索结果: 1-6 共查到“军事学 inner products”相关记录6条 . 查询时间(0.075 秒)
FE for Inner Products and Its Application to Decentralized ABE
functional encryption ABE LWE DDH
2019/1/18
In this work, we revisit the primitive functional encryption (FE) for inner products and show its application to decentralized attribute- based encryption (ABE). Particularly, we derive an FE for inne...
Multi-Input Functional Encryption for Inner Products: Function-Hiding Realizations and Constructions without Pairings
Functional Encryption multi-input inner-product
2017/10/9
We present new constructions of multi-input functional encryption (MIFE) schemes for the inner-product functionality that improve the state of the art solution of Abdalla et al. (Eurocrypt 2017) in tw...
Two-Input Functional Encryption for Inner Products from Bilinear Maps
Functional encryption Multi-input functional encryption Inner product
2016/5/3
Functional encryption is a new paradigm of public-key encryption that allows a user to compute f(x) on encrypted data CT(x) with a private key SKf to finely control the revealed information. Multi-inp...
Simple Functional Encryption Schemes for Inner Products
Functional Encryption Inner-Product Generic Constructions
2016/1/5
Functional encryption is a new paradigm that allows users to finely control the amount
of information that is revealed by a ciphertext to a given receiver. Recent papers have
focused their attention...
Fully Secure Functional Encryption for Inner Products, from Standard Assumptions
Functional encryption adaptive security standard assumptions
2015/12/29
Functional encryption is a modern public-key paradigm where
a master secret key can be used to derive sub-keys SKF associated
with certain functions F in such a way that the decryption operation
re...
Predicate Encryption Supporting Disjunctions,Polynomial Equations, and Inner Products
Supporting Disjunctions,Polynomial Equations Inner Products
2008/5/26
Predicate encryption is a new paradigm generalizing, among other things, identity-based
encryption. In a predicate encryption scheme, secret keys correspond to predicates and ciphertexts are associat...