搜索结果: 1-13 共查到“知识库 军事学 By-products”相关记录13条 . 查询时间(0.118 秒)
FE for Inner Products and Its Application to Decentralized ABE
functional encryption ABE LWE DDH
2019/1/18
In this work, we revisit the primitive functional encryption (FE) for inner products and show its application to decentralized attribute- based encryption (ABE). Particularly, we derive an FE for inne...
We describe obfuscation schemes for matrix-product branching programs that are purely algebraic and employ matrix algebra and tensor algebra over a finite field. In contrast to the obfuscation schemes...
Multi-Input Functional Encryption for Inner Products: Function-Hiding Realizations and Constructions without Pairings
Functional Encryption multi-input inner-product
2017/10/9
We present new constructions of multi-input functional encryption (MIFE) schemes for the inner-product functionality that improve the state of the art solution of Abdalla et al. (Eurocrypt 2017) in tw...
Suppose nn parties have respective inputs x1,…,xn∈Gx1,…,xn∈G, where GG is a finite group. The parties would like to privately compute x1x2⋯xnx1x2⋯xn (where multiplication refers to the gro...
Two-Input Functional Encryption for Inner Products from Bilinear Maps
Functional encryption Multi-input functional encryption Inner product
2016/5/3
Functional encryption is a new paradigm of public-key encryption that allows a user to compute f(x) on encrypted data CT(x) with a private key SKf to finely control the revealed information. Multi-inp...
Probability that the k-gcd of products of positive integers is B-smooth
gcd of products of positive integers B-smooth k-gcd
2016/4/7
In 1849, Dirichlet[5] proved that the probability that two positive integers are relatively prime is 1/zeta(2). Later, it was generalized into the case that positive integers has no nontrivial kth pow...
Simple Functional Encryption Schemes for Inner Products
Functional Encryption Inner-Product Generic Constructions
2016/1/5
Functional encryption is a new paradigm that allows users to finely control the amount
of information that is revealed by a ciphertext to a given receiver. Recent papers have
focused their attention...
Fully Secure Functional Encryption for Inner Products, from Standard Assumptions
Functional encryption adaptive security standard assumptions
2015/12/29
Functional encryption is a modern public-key paradigm where
a master secret key can be used to derive sub-keys SKF associated
with certain functions F in such a way that the decryption operation
re...
Iterated group products and leakage resilience against NC^1
leakage-resilient cryptography iterated group products
2014/3/5
We show that if NC^1 \neq L, then for every element g of the alternating group A_t, circuits of depth O(log t) cannot distinguish between a uniform vector over (A_t)^t with product = g and one with pr...
Chosen-Ciphertext Security via Correlated Products
Chosen-Ciphertext Security chosen-ciphertext attacks lossy trapdoor functions
2009/6/3
We initiate the study of one-wayness under correlated products. We are interested in identify-
ing necessary and sufficient conditions for a function f and a distribution on inputs (x1; : : : ; xk),
...
Efficient Computation Modulo a Shared Secret with Application to the Generation of Shared Safe-Prime Products
RSA safe primes threshold cryptography
2009/4/13
In many pairing-based protocols often the evaluation of the
product of many pairing evaluations is required. In this paper we consider
methods to compute such products efficiently. Focusing on pair...
Predicate Encryption Supporting Disjunctions,Polynomial Equations, and Inner Products
Supporting Disjunctions,Polynomial Equations Inner Products
2008/5/26
Predicate encryption is a new paradigm generalizing, among other things, identity-based
encryption. In a predicate encryption scheme, secret keys correspond to predicates and ciphertexts are associat...