Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "Hierarchical Functional Encryption"
@inproceedings{DBLP:conf/sss/BelelDM23, author = {Anushree Belel and Ratna Dutta and Sourav Mukhopadhyay}, editor = {Shlomi Dolev and Baruch Schieber}, title = {Hierarchical Identity-Based Inner Product Functional Encryption for Unbounded Hierarchical Depth}, booktitle = {Stabilization, Safety, and Security of Distributed Systems - 25th International Symposium, {SSS} 2023, Jersey City, NJ, USA, October 2-4, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {14310}, pages = {274--288}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-44274-2\_20}, doi = {10.1007/978-3-031-44274-2\_20}, timestamp = {Sun, 08 Oct 2023 13:20:04 +0200}, biburl = {https://dblp.org/rec/conf/sss/BelelDM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisa/BelelDM22, author = {Anushree Belel and Ratna Dutta and Sourav Mukhopadhyay}, editor = {Jiageng Chen and Debiao He and Rongxing Lu}, title = {Hierarchical Identity Based Inner Product Functional Encryption for Privacy Preserving Statistical Analysis Without q-type Assumption}, booktitle = {Emerging Information Security and Applications - Third International Conference, {EISA} 2022, Wuhan, China, October 29-30, 2022, Proceedings}, series = {Communications in Computer and Information Science}, volume = {1641}, pages = {108--125}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-23098-1\_7}, doi = {10.1007/978-3-031-23098-1\_7}, timestamp = {Wed, 08 Mar 2023 15:07:45 +0100}, biburl = {https://dblp.org/rec/conf/eisa/BelelDM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/SongDHPTW21, author = {Ge Song and Yuqiao Deng and Qiong Huang and Changgen Peng and Chunming Tang and Xiaohua Wang}, title = {Hierarchical identity-based inner product functional encryption}, journal = {Inf. Sci.}, volume = {573}, pages = {332--344}, year = {2021}, url = {https://doi.org/10.1016/j.ins.2021.05.062}, doi = {10.1016/J.INS.2021.05.062}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isci/SongDHPTW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/ZhangMYW17, author = {Shiwei Zhang and Yi Mu and Guomin Yang and Xiaofen Wang}, editor = {Josef Pieprzyk and Suriadi Suriadi}, title = {Hierarchical Functional Encryption for Linear Transformations}, booktitle = {Information Security and Privacy - 22nd Australasian Conference, {ACISP} 2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10342}, pages = {23--43}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-60055-0\_2}, doi = {10.1007/978-3-319-60055-0\_2}, timestamp = {Sun, 02 Jun 2019 21:26:44 +0200}, biburl = {https://dblp.org/rec/conf/acisp/ZhangMYW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/innovations/BrakerskiCGJSS17, author = {Zvika Brakerski and Nishanth Chandran and Vipul Goyal and Aayush Jain and Amit Sahai and Gil Segev}, editor = {Christos H. Papadimitriou}, title = {Hierarchical Functional Encryption}, booktitle = {8th Innovations in Theoretical Computer Science Conference, {ITCS} 2017, January 9-11, 2017, Berkeley, CA, {USA}}, series = {LIPIcs}, volume = {67}, pages = {8:1--8:27}, publisher = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik}, year = {2017}, url = {https://doi.org/10.4230/LIPIcs.ITCS.2017.8}, doi = {10.4230/LIPICS.ITCS.2017.8}, timestamp = {Tue, 11 Feb 2020 15:52:14 +0100}, biburl = {https://dblp.org/rec/conf/innovations/BrakerskiCGJSS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BrakerskiS15, author = {Zvika Brakerski and Gil Segev}, title = {Hierarchical Functional Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1011}, year = {2015}, url = {http://eprint.iacr.org/2015/1011}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BrakerskiS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/LewkoOSTW10, author = {Allison B. Lewko and Tatsuaki Okamoto and Amit Sahai and Katsuyuki Takashima and Brent Waters}, editor = {Henri Gilbert}, title = {Fully Secure Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner Product Encryption}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2010, 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Monaco / French Riviera, May 30 - June 3, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6110}, pages = {62--91}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13190-5\_4}, doi = {10.1007/978-3-642-13190-5\_4}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/LewkoOSTW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LewkoOSTW10, author = {Allison B. Lewko and Tatsuaki Okamoto and Amit Sahai and Katsuyuki Takashima and Brent Waters}, title = {Fully Secure Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner Product Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {110}, year = {2010}, url = {http://eprint.iacr.org/2010/110}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LewkoOSTW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.