Search dblp for Publications

export results for "Hierarchical Functional Encryption"

 download as .bib file

@inproceedings{DBLP:conf/sss/BelelDM23,
  author       = {Anushree Belel and
                  Ratna Dutta and
                  Sourav Mukhopadhyay},
  editor       = {Shlomi Dolev and
                  Baruch Schieber},
  title        = {Hierarchical Identity-Based Inner Product Functional Encryption for
                  Unbounded Hierarchical Depth},
  booktitle    = {Stabilization, Safety, and Security of Distributed Systems - 25th
                  International Symposium, {SSS} 2023, Jersey City, NJ, USA, October
                  2-4, 2023, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {14310},
  pages        = {274--288},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-44274-2\_20},
  doi          = {10.1007/978-3-031-44274-2\_20},
  timestamp    = {Sun, 08 Oct 2023 13:20:04 +0200},
  biburl       = {https://dblp.org/rec/conf/sss/BelelDM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisa/BelelDM22,
  author       = {Anushree Belel and
                  Ratna Dutta and
                  Sourav Mukhopadhyay},
  editor       = {Jiageng Chen and
                  Debiao He and
                  Rongxing Lu},
  title        = {Hierarchical Identity Based Inner Product Functional Encryption for
                  Privacy Preserving Statistical Analysis Without q-type Assumption},
  booktitle    = {Emerging Information Security and Applications - Third International
                  Conference, {EISA} 2022, Wuhan, China, October 29-30, 2022, Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {1641},
  pages        = {108--125},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-23098-1\_7},
  doi          = {10.1007/978-3-031-23098-1\_7},
  timestamp    = {Wed, 08 Mar 2023 15:07:45 +0100},
  biburl       = {https://dblp.org/rec/conf/eisa/BelelDM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/SongDHPTW21,
  author       = {Ge Song and
                  Yuqiao Deng and
                  Qiong Huang and
                  Changgen Peng and
                  Chunming Tang and
                  Xiaohua Wang},
  title        = {Hierarchical identity-based inner product functional encryption},
  journal      = {Inf. Sci.},
  volume       = {573},
  pages        = {332--344},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.ins.2021.05.062},
  doi          = {10.1016/J.INS.2021.05.062},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isci/SongDHPTW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/ZhangMYW17,
  author       = {Shiwei Zhang and
                  Yi Mu and
                  Guomin Yang and
                  Xiaofen Wang},
  editor       = {Josef Pieprzyk and
                  Suriadi Suriadi},
  title        = {Hierarchical Functional Encryption for Linear Transformations},
  booktitle    = {Information Security and Privacy - 22nd Australasian Conference, {ACISP}
                  2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10342},
  pages        = {23--43},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-60055-0\_2},
  doi          = {10.1007/978-3-319-60055-0\_2},
  timestamp    = {Sun, 02 Jun 2019 21:26:44 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/ZhangMYW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/innovations/BrakerskiCGJSS17,
  author       = {Zvika Brakerski and
                  Nishanth Chandran and
                  Vipul Goyal and
                  Aayush Jain and
                  Amit Sahai and
                  Gil Segev},
  editor       = {Christos H. Papadimitriou},
  title        = {Hierarchical Functional Encryption},
  booktitle    = {8th Innovations in Theoretical Computer Science Conference, {ITCS}
                  2017, January 9-11, 2017, Berkeley, CA, {USA}},
  series       = {LIPIcs},
  volume       = {67},
  pages        = {8:1--8:27},
  publisher    = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik},
  year         = {2017},
  url          = {https://doi.org/10.4230/LIPIcs.ITCS.2017.8},
  doi          = {10.4230/LIPICS.ITCS.2017.8},
  timestamp    = {Tue, 11 Feb 2020 15:52:14 +0100},
  biburl       = {https://dblp.org/rec/conf/innovations/BrakerskiCGJSS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BrakerskiS15,
  author       = {Zvika Brakerski and
                  Gil Segev},
  title        = {Hierarchical Functional Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1011},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1011},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BrakerskiS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/LewkoOSTW10,
  author       = {Allison B. Lewko and
                  Tatsuaki Okamoto and
                  Amit Sahai and
                  Katsuyuki Takashima and
                  Brent Waters},
  editor       = {Henri Gilbert},
  title        = {Fully Secure Functional Encryption: Attribute-Based Encryption and
                  (Hierarchical) Inner Product Encryption},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2010, 29th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Monaco / French Riviera, May 30 - June 3, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6110},
  pages        = {62--91},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13190-5\_4},
  doi          = {10.1007/978-3-642-13190-5\_4},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/LewkoOSTW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LewkoOSTW10,
  author       = {Allison B. Lewko and
                  Tatsuaki Okamoto and
                  Amit Sahai and
                  Katsuyuki Takashima and
                  Brent Waters},
  title        = {Fully Secure Functional Encryption: Attribute-Based Encryption and
                  (Hierarchical) Inner Product Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {110},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/110},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LewkoOSTW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics