Skip to content

Commit b2fbf4e

Browse files
committed
Add paper on definitions of Functional Encryption. Predicate Encryption seems to be a subclass of Functional Encryption.
FossilOrigin-Name: be5579f3832328c1fcdcd51069f355d6726cdeb7d4beae31135d7a41bd641c9b
1 parent 62fcd78 commit b2fbf4e

File tree

1 file changed

+24
-0
lines changed

1 file changed

+24
-0
lines changed

references/lumosql-abe.bib

+24
Original file line numberDiff line numberDiff line change
@@ -260,3 +260,27 @@ @ARTICLE{Herranz2017-ze
260260
language = "en"
261261
}
262262

263+
@misc{cryptoeprint:2010/543,
264+
author = {Dan Boneh and Amit Sahai and Brent Waters},
265+
title = {Functional Encryption: Definitions and Challenges},
266+
abstract = {We initiate the formal study of functional encryption by
267+
giving precise definitions of the concept and its security. Roughly speaking,
268+
functional encryption supports restricted secret keys that enable a key holder
269+
to learn a specific function of encrypted data, but learn nothing else about
270+
the data. For example, given an encrypted program the secret key may enable the
271+
key holder to learn the output of the program on a specific input without
272+
learning anything else about the program.
273+
We show that defining security for functional encryption is non-trivial. First,
274+
we show that a natural game-based definition is inadequate for some
275+
functionalities. We then present a natural simulation-based definition and show
276+
that it (provably) cannot be satisfied in the standard model, but can be
277+
satisfied in the random oracle model. We show how to map many existing concepts
278+
to our formalization of functional encryption and conclude with several
279+
interesting open problems in this young area.},
280+
howpublished = {Cryptology ePrint Archive, Paper 2010/543},
281+
year = {2010},
282+
note = {\url{https://eprint.iacr.org/2010/543}},
283+
doi = {https://doi.org/10.1007/978-3-642-19571-6_16},
284+
url = {https://eprint.iacr.org/2010/543}
285+
}
286+

0 commit comments

Comments
 (0)