154
click to vote
EUROCRYPT
15 years 6 months ago
2010 Springer
In this paper, we present two fully secure functional encryption schemes. Our first result is a fully secure attribute-based encryption (ABE) scheme. Previous constructions of AB...
118
click to vote
EUROCRYPT
15 years 6 months ago
2010 Springer
We describe a very simple “somewhat homomorphic” encryption scheme using only elementary modular arithmetic, and use Gentry’s techniques to convert it into a fully homomorph...
EUROCRYPT
15 years 6 months ago
2010 Springer 161
click to vote
EUROCRYPT
15 years 6 months ago
2010 Springer
Imagine many small devices send data to a single receiver, encrypted using the receiver’s public key. Assume an adversary that has the power to adaptively corrupt a subset of the...
EUROCRYPT
15 years 6 months ago
2010 Springer
Abstract. Physical computational devices leak side-channel information that may, and often does, reveal secret internal states. We present a general transformation that compiles an...
|