198
Voted
EUROCRYPT
15 years 10 months ago
2010 Springer
In this paper, we present two fully secure functional encryption schemes. Our first result is a fully secure attribute-based encryption (ABE) scheme. Previous constructions of AB...
158
click to vote
EUROCRYPT
15 years 10 months ago
2010 Springer
We describe a very simple “somewhat homomorphic” encryption scheme using only elementary modular arithmetic, and use Gentry’s techniques to convert it into a fully homomorph...
133
Voted
EUROCRYPT
15 years 10 months ago
2010 Springer 205
click to vote
EUROCRYPT
15 years 10 months ago
2010 Springer
Imagine many small devices send data to a single receiver, encrypted using the receiver’s public key. Assume an adversary that has the power to adaptively corrupt a subset of the...
136
click to vote
EUROCRYPT
15 years 10 months ago
2010 Springer
Abstract. Physical computational devices leak side-channel information that may, and often does, reveal secret internal states. We present a general transformation that compiles an...
|