Browse > Article

함수암호 기술 연구 동향  

Seo, Minhye (덕성여자대학교 사이버보안전공)
Keywords
Citations & Related Records
연도 인용수 순위
  • Reference
1 S. Garg, C. Gentry, S. Halevi, M. Raykova, A. Sahai, B. Waters, "Candidate Indistinguishability Obfuscation and Functional Encryption for all Circuits," FOCS 2013, pp. 40-49, 2013.
2 J.H. Cheon, W. Cho, M. Hhan, J. Kim, C. Lee, "Statistical Zeroizing Attack: Cryptanalysis of Candidates of BP Obfuscation over GGH15 Multilinear Map," CRYPTO 2019, LNCS 11694, pp. 253-283, 2019.
3 H. Wee, "Functional Encryption for Quadratic Functions from k-Lin, Revisited," TCC 2020, LNCS 12550, pp. 210-228, 2020.
4 S. Agrawal, B. Libert, M. Maitra, R. Titiu, "Adaptive Simulation Security for Inner Product Functional Encryption," PKC 2020, LNCS 12110, pp. 34-64, 2020.
5 S. Agrawal, B. Libert, D. Stehle, "Fully Secure Functional Encryption for Inner Products from Standard Assumption," CRYPTO 2016, LNCS 9816, pp. 333-362, 2016.
6 D. Boneh, A. Sahai, B. Waters, "Functional Encryption: Definitions and Challenges," TCC 2011, LNCS 6597, pp. 253-273, 2011.
7 C.E.Z. Baltico, D. Catalano, D. Fiore, R. Gay, "Practical Functional Encryption for Quadratic Functions with Applications to Predicate Encryption," CRYPTO 2017, LNCS 10401, pp. 67-98, 2017.
8 M. Barbosa, D. Catalano, A. Soleimanian, B. Warinschi, "Efficient Function-Hiding Functional Encryption: From Inner-Products to Orthogonality," CT-RSA 2019, LNCS 11405, pp. 127-148, 2019.
9 Z. Brakerski, G. Segev, "Function-Private Functional Encryption in the Private-Key Setting," TCC 2015, LNCS 9015, pp. 306-324, 2015.
10 J.H. Cheon, P.-A. Fouque, C. Lee, B. Minaud, H. Ryu, "Cryptanalysis of the New CLT Multilinear Map over the Integers," EUROCRYPT 2016, LNCS 9665, pp. 509-536, 2016.
11 P. Datta, R. Dutta, S. Mukhopadhyay, "Functional Encryption for Inner Product with Full Function Privacy," PKC 2016, LNCS 9614, pp. 164-195, 2016.
12 X.T. Do, D.H. Phan, D. Pointcheval, "Traceable Inner Product Functional Encryption," CT-RSA 2020, LNCS 12006, pp. 564-585, 2020.
13 M. Abdalla, R. Gay, M. Raykova, H. Wee, "Multi-input Inner-Product Functional Encryption from Pairings," EUROCRYPT 2017, LNCS 10210, pp. 601-626, 2017.
14 N. Soroush, V. Iovion, A. Rial, P.B. Roenne, P.Y.A. Ryan, "Verifiable Inner Product Encryption Scheme," PKC 2020, LNCS 12110, pp. 65-94, 2020.
15 M. Abdalla, F. Bourse, H. Marival, D. Pointcheval, A. Soleimanian, H. Waldner, "Multi-Client Inner-Product Functional Encryption in the Random-Oracle Model," SCN 2020, LNCS 12238, pp. 525-545, 2020.
16 N. Bitansky, V. Vaikuntanathan, "Indistinguishability Obfuscation from Functional Encryption," FOCS 2015, pp. 171-190, 2015.
17 M. Abdalla, F. Bourse, A.D. Caro, D. Pointcheval, "Simple Functional Encryption Schemes for Inner Products," PKC 2015, LNCS 9020, pp. 733-751, 2015.
18 M. Abdalla, F. Benhamouda, M. Kohlweiss, H. Waldner, "Decentralizing Inner-Product Functional Encryption," PKC 2019, LNCS 11443, pp. 128-157, 2019.
19 S. Agrawal, R. Goyal, J. Tomida, "Multi-input Quadratic Functional Encryption from Pairings," CRYPTO 2021, LNCS 12828, pp. 208-238, 2021.
20 P. Ananth, A. Jain, "Indistinguishability Obfuscation from Compact Functional Encryption," CRYPTO 2015, LNCS 9215, pp. 308-326, 2015.
21 A. Bishop, A. Jain, L, Kowalczyk, "Function-Hiding Inner Product Encryption," ASIACRYPT 2015, LNCS 9452, pp. 470-491, 2015.
22 J.H. Cheon, K. Han, C. Lee, H. Ryu, D. Stehle, "Cryptanalysis of the Multilinear Map over the Integers," EUROCRYPT 2015, LNCS 9056, pp. 3-12, 2015.
23 B. Fisch, D. Winayagamurthy, D. Boneh, S. Gorbunov, "IRON: Functional Encryption using Intel SGX," CCS 2017, pp. 765-782, 2017.
24 S. Garg, C. Gentry, S. Halevi, M. Zhandry, "Functional Encryption Without Obfuscation," TCC 2016, LNCS 9563, pp. 480-511, 2016.
25 S. Goldwasser, Y. Kalai, R.A. Popa, V. Vaikuntanathan, N. Zeldovich, "Reusable garbled circuits and succinct functional encryption," STOC 2013, pp. 555-564, 2013.
26 K. Lee, M. Seo, "Functional encryption for set intersection in the multi-client setting," Design, Codes and Cryptography, vol. 90, pp. 17-47, 2022.   DOI
27 S. Gorbunov, V. Vaikuntanathan, H. Wee, "Attribute-based encryption for circuits," STOC 2013, pp. 545-554, 2013.
28 S. Kim, K. Lewi, A. Mandal, H. Montgomery, A. Roy, D.J. Wu, "Function-Hiding Inner Product Encryption is Practical," SCN 2018, LNCS 11035, pp. 544-562, 2018.
29 S. Goldwasser, S.D. Gordon, V. Goyal, A. Jain, J. Katz, F.-H. Liu, A. Sahai, E. Shi, H.-S. Zhou, "Multi-input Functional Encryption," EUROCRYPT 2014, LNCS 8441, pp. 578-602, 2014.
30 K. Lewi, D.J. Wu, "Order-Revealing Encryption: New Constructions, Applications, and Lower Bounds," CCS 2016, pp. 1167-1178, 2016.
31 T. Ryffel, D. Pointcheval, F. Bach, E. D.-Sans, R. Gay, "Partially Encrypted Deep Machine Learning using Functional Encryption," NIPS 2019, vol. 32, pp. 4517-4528, 2019.
32 B. Waters, "A Punctured Programming Approach to Adaptively Secure Functional Encryption," CRYPTO 2015, LNCS 9216, pp. 678-697, 2015.
33 Z. Zhang, F. Zhang, "Functional encryption for cubic polynomials and implementation," Theoretical Computer Science, vol. 885, pp. 41-54, 2021.   DOI