@@ -260,3 +260,27 @@ @ARTICLE{Herranz2017-ze
260
260
language = " en"
261
261
}
262
262
263
+ @misc {cryptoeprint:2010/543 ,
264
+ author = { Dan Boneh and Amit Sahai and Brent Waters} ,
265
+ title = { Functional Encryption: Definitions and Challenges} ,
266
+ abstract = { We initiate the formal study of functional encryption by
267
+ giving precise definitions of the concept and its security. Roughly speaking,
268
+ functional encryption supports restricted secret keys that enable a key holder
269
+ to learn a specific function of encrypted data, but learn nothing else about
270
+ the data. For example, given an encrypted program the secret key may enable the
271
+ key holder to learn the output of the program on a specific input without
272
+ learning anything else about the program.
273
+ We show that defining security for functional encryption is non-trivial. First,
274
+ we show that a natural game-based definition is inadequate for some
275
+ functionalities. We then present a natural simulation-based definition and show
276
+ that it (provably) cannot be satisfied in the standard model, but can be
277
+ satisfied in the random oracle model. We show how to map many existing concepts
278
+ to our formalization of functional encryption and conclude with several
279
+ interesting open problems in this young area.} ,
280
+ howpublished = { Cryptology ePrint Archive, Paper 2010/543} ,
281
+ year = { 2010} ,
282
+ note = { \url{https://eprint.iacr.org/2010/543}} ,
283
+ doi = { https://doi.org/10.1007/978-3-642-19571-6_16} ,
284
+ url = { https://eprint.iacr.org/2010/543}
285
+ }
286
+
0 commit comments