We present new constructions of multi-input functional encryption (MIFE) schemes for the inner-product functionality that improve the state of the art solution of Abdalla et al. (Eurocrypt 2017) in two main directions. First, we put forward a novel methodology to convert single-input functional ...
Finally, we note that in addition to introducing the notion of a multi-input functional encryption scheme, Goldwasser et al. [24] introduced the more general notion of amulti-clientmulti-input functional encryption scheme. In such a scheme, each input coordinate is associated with its own encrypt...
Multi-Input Functional Encryption:多输入功能的加密 热度: LMA-3 Multi-sensor Auxiliary Input Device User Manual - Innovate lma-3多传感器辅助输入设备的用户手册-创新 热度: 基于少模光纤的模分复用系统多输入多输出均衡与解调 Demodulation and multi-input multi-output equalization for mode division multiplexin...
We extend the reach of functional encryption schemes that are provably secure under simple assumptions against unbounded collusion to include function-hiding inner product schemes. Our scheme is a private key functional encryption scheme, where ciphertexts correspond to vectors \(\vec {x}\), secret ...
(resp. polynomial) number of parties. Prior to our work, both of these applications required much heavier tools such as indistinguishability obfuscation or compact functional encryption.
The notion of multi-input functional encryption (MI-FE) was recently introduced by Goldwasser et al. [EUROCRYPT'14] as a means to non-interactively compute aggregate information on the joint private data of multiple users. A fundamental limitation of their work, however, is that the total ...
Order-preserving encryption provides one solution, but provably provides only limited security guarantees. Two-input functional encryption is another approach, but requires the full power of obfuscation machinery and is currently not implementable. We construct the first implementable encryption system ...
We introduce the problem of Multi-Input Functional Encryption, where a secret key sk f can correspond to an n -ary function f that takes multiple ciphertexts as input. We formulate both indistinguishability-based and simulation-based definitions of security for this notion, and show close ...
Multi-Input Functional Encryption in the Private-Key Setting: Stronger Security from Weaker AssumptionsZvika BrakerskiIlan KomargodskiGil SegevBrakerski, Z., Komargodski, I., Segev, G.: Multi-input functional encryption in the private-key setting: Stronger security from weaker assumptions. Cryptology...
Adam O'NeillJustin ThalerSchloss Dagstuhl - Leibniz-Zentrum für InformatikConference on Innovations in Theoretical Computer ScienceS. Goldwasser, S. D. Gordon, V. Goyal, A. Jain, J. Katz, F. Liu, A. Sahai, E. Shi, and H. Zhou. Multi-input functional encryption. In EUROCRYPT, 2014....