Practical, Round-Optimal Lattice-Based Blind Signatures | 0 | 0.34 | 2022 |
Deniable Fully Homomorphic Encryption From Learning With Errors | 0 | 0.34 | 2021 |
Multi-Party Functional Encryption | 0 | 0.34 | 2021 |
Multi-Input Quadratic Functional Encryption From Pairings | 0 | 0.34 | 2021 |
Functional Encryption For Turing Machines With Dynamic Bounded Collusion From Lwe | 0 | 0.34 | 2021 |
Adaptive Simulation Security for Inner Product Functional Encryption. | 0 | 0.34 | 2020 |
Cryptography from One-Way Communication: On Completeness of Finite Channels. | 0 | 0.34 | 2020 |
A Practical Model for Collaborative Databases: Securely Mixing, Searching and Computing. | 0 | 0.34 | 2019 |
Ad Hoc Multi-Input Functional Encryption. | 0 | 0.34 | 2019 |
Attribute Based Encryption (and more) for Nondeterministic Finite Automata from LWE. | 0 | 0.34 | 2019 |
Attribute Based Encryption for Deterministic Finite Automata from mathsfDLIN. | 0 | 0.34 | 2019 |
Indistinguishability Obfuscation Without Multilinear Maps: New Methods for Bootstrapping and Instantiation | 1 | 0.34 | 2019 |
Attribute Based Encryption for Deterministic Finite Automata from DLIN. | 0 | 0.34 | 2019 |
New Methods for Indistinguishability Obfuscation: Bootstrapping and Instantiation. | 0 | 0.34 | 2018 |
Fe And Io For Turing Machines From Minimal Assumptions | 0 | 0.34 | 2018 |
Wiretap Polar Codes In Encryption Schemes Based On Learning With Errors Problem | 0 | 0.34 | 2018 |
Encryption with Untrusted Keys: Security against Chosen Objects Attack. | 0 | 0.34 | 2018 |
Functional Encryption for Bounded Collusions, Revisited. | 2 | 0.36 | 2017 |
Reusable Garbled Deterministic Finite Automata from Learning With Errors. | 0 | 0.34 | 2017 |
Stronger Security for Reusable Garbled Circuits, General Definitions and Attacks. | 5 | 0.39 | 2017 |
Efficient Public Trace and Revoke from Standard Assumptions: Extended Abstract. | 2 | 0.37 | 2017 |
Fully Secure Functional Encryption for Inner Products, from Standard Assumptions. | 26 | 0.89 | 2016 |
Interpolating Predicate and Functional Encryption from Learning With Errors. | 0 | 0.34 | 2016 |
Online-Offline Functional Encryption for Bounded Collusions. | 2 | 0.37 | 2016 |
Statistical Randomized Encodings: A Complexity Theoretic View | 4 | 0.37 | 2015 |
Cryptographic Agents: Towards a Unified Theory of Computing on Encrypted Data. | 4 | 0.44 | 2015 |
Towards a Unified Theory of Cryptographic Agents. | 0 | 0.34 | 2014 |
Discrete Gaussian Leftover Hash Lemma over Infinite Domains | 11 | 0.88 | 2013 |
On Continual Leakage of Discrete Log Representations. | 18 | 0.62 | 2013 |
Function Private Functional Encryption and Property Preserving Encryption : New Definitions and Positive Results. | 18 | 0.72 | 2013 |
Functional Encryption: New Perspectives and Lower Bounds. | 25 | 1.06 | 2012 |
Sampling Discrete Gaussians Efficiently and Obliviously. | 2 | 0.55 | 2012 |
Functional encryption for threshold functions (or fuzzy IBE) from lattices | 10 | 0.61 | 2012 |
New Impossibility Results for Concurrent Composition and a Non-Interactive Completeness Theorem for Secure Computation. | 8 | 0.43 | 2012 |
Secrecy Using Compressive Sensing | 9 | 0.49 | 2011 |
Fuzzy Identity Based Encryption from Lattices. | 0 | 0.34 | 2011 |
Functional encryption for inner product predicates from learning with errors | 34 | 0.99 | 2011 |
Efficient lattice (H)IBE in the standard model | 170 | 5.39 | 2010 |
Lattice basis delegation in fixed dimension and shorter-ciphertext hierarchical IBE | 133 | 3.99 | 2010 |
Preventing pollution attacks in multi-source network coding | 16 | 0.71 | 2010 |
On algebraic traceback in dynamic networks | 0 | 0.34 | 2009 |
Homomorphic MACs: MAC-Based Integrity for Network Coding | 122 | 3.32 | 2009 |
On the secrecy rate of interference networks using structured codes | 10 | 0.96 | 2009 |
Construction of a coherency preserving dynamic data dissemination network | 4 | 0.48 | 2004 |