Matches in SemOpenAlex for { <https://semopenalex.org/work/W2553598483> ?p ?o ?g. }
- W2553598483 endingPage "587" @default.
- W2553598483 startingPage "557" @default.
- W2553598483 abstract "In light of security challenges that have emerged in a world with complex networks and cloud computing, the notion of functional encryption has recently emerged. In this work, we show that in several applications of functional encryption (even those cited in the earliest works on functional encryption), the formal notion of functional encryption is actually not sufficient to guarantee security. This is essentially because the case of a malicious authority and/or encryptor is not considered. To address this concern, we put forth the concept of verifiable functional encryption, which captures the basic requirement of output correctness: even if the ciphertext is maliciously generated (and even if the setup and key generation is malicious), the decryptor is still guaranteed a meaningful notion of correctness which we show is crucial in several applications. We formalize the notion of verifiable function encryption and, following prior work in the area, put forth a simulation-based and an indistinguishability-based notion of security. We show that simulation-based verifiable functional encryption is unconditionally impossible even in the most basic setting where there may only be a single key and a single ciphertext. We then give general positive results for the indistinguishability setting: a general compiler from any functional encryption scheme into a verifiable functional encryption scheme with the only additional assumption being the Decision Linear Assumption over Bilinear Groups (DLIN). We also give a generic compiler in the secret-key setting for functional encryption which maintains both message privacy and function privacy. Our positive results are general and also apply to other simpler settings such as Identity-Based Encryption, Attribute-Based Encryption and Predicate Encryption. We also give an application of verifiable functional encryption to the recently introduced primitive of functional commitments. Finally, in the context of indistinguishability obfuscation, there is a fundamental question of whether the correct program was obfuscated. In particular, the recipient of the obfuscated program needs a guarantee that the program indeed does what it was intended to do. This question turns out to be closely related to verifiable functional encryption. We initiate the study of verifiable obfuscation with a formal definition and construction of verifiable indistinguishability obfuscation." @default.
- W2553598483 created "2016-11-30" @default.
- W2553598483 creator A5004083172 @default.
- W2553598483 creator A5033799874 @default.
- W2553598483 creator A5086787223 @default.
- W2553598483 creator A5087900012 @default.
- W2553598483 date "2016-01-01" @default.
- W2553598483 modified "2023-09-26" @default.
- W2553598483 title "Verifiable Functional Encryption" @default.
- W2553598483 cites W1026822280 @default.
- W2553598483 cites W110839122 @default.
- W2553598483 cites W131146259 @default.
- W2553598483 cites W1419302722 @default.
- W2553598483 cites W1498316612 @default.
- W2553598483 cites W1522706628 @default.
- W2553598483 cites W1581814815 @default.
- W2553598483 cites W1584348354 @default.
- W2553598483 cites W1592092778 @default.
- W2553598483 cites W1596208550 @default.
- W2553598483 cites W1724472458 @default.
- W2553598483 cites W1964334488 @default.
- W2553598483 cites W2008701790 @default.
- W2553598483 cites W2053723853 @default.
- W2553598483 cites W2054904172 @default.
- W2553598483 cites W2086042811 @default.
- W2553598483 cites W2113717903 @default.
- W2553598483 cites W2138001464 @default.
- W2553598483 cites W2148888468 @default.
- W2553598483 cites W2152394049 @default.
- W2553598483 cites W2161214158 @default.
- W2553598483 cites W2161508639 @default.
- W2553598483 cites W2196732887 @default.
- W2553598483 cites W2296067100 @default.
- W2553598483 cites W2899558955 @default.
- W2553598483 cites W65414435 @default.
- W2553598483 doi "https://doi.org/10.1007/978-3-662-53890-6_19" @default.
- W2553598483 hasPublicationYear "2016" @default.
- W2553598483 type Work @default.
- W2553598483 sameAs 2553598483 @default.
- W2553598483 citedByCount "28" @default.
- W2553598483 countsByYear W25535984832017 @default.
- W2553598483 countsByYear W25535984832018 @default.
- W2553598483 countsByYear W25535984832019 @default.
- W2553598483 countsByYear W25535984832020 @default.
- W2553598483 countsByYear W25535984832021 @default.
- W2553598483 countsByYear W25535984832022 @default.
- W2553598483 countsByYear W25535984832023 @default.
- W2553598483 crossrefType "book-chapter" @default.
- W2553598483 hasAuthorship W2553598483A5004083172 @default.
- W2553598483 hasAuthorship W2553598483A5033799874 @default.
- W2553598483 hasAuthorship W2553598483A5086787223 @default.
- W2553598483 hasAuthorship W2553598483A5087900012 @default.
- W2553598483 hasConcept C11413529 @default.
- W2553598483 hasConcept C119133118 @default.
- W2553598483 hasConcept C148730421 @default.
- W2553598483 hasConcept C177264268 @default.
- W2553598483 hasConcept C184685986 @default.
- W2553598483 hasConcept C199360897 @default.
- W2553598483 hasConcept C203062551 @default.
- W2553598483 hasConcept C204806902 @default.
- W2553598483 hasConcept C2780746774 @default.
- W2553598483 hasConcept C38652104 @default.
- W2553598483 hasConcept C41008148 @default.
- W2553598483 hasConcept C54569210 @default.
- W2553598483 hasConcept C55439883 @default.
- W2553598483 hasConcept C57795399 @default.
- W2553598483 hasConcept C7646194 @default.
- W2553598483 hasConcept C80444323 @default.
- W2553598483 hasConcept C85847156 @default.
- W2553598483 hasConcept C93974786 @default.
- W2553598483 hasConceptScore W2553598483C11413529 @default.
- W2553598483 hasConceptScore W2553598483C119133118 @default.
- W2553598483 hasConceptScore W2553598483C148730421 @default.
- W2553598483 hasConceptScore W2553598483C177264268 @default.
- W2553598483 hasConceptScore W2553598483C184685986 @default.
- W2553598483 hasConceptScore W2553598483C199360897 @default.
- W2553598483 hasConceptScore W2553598483C203062551 @default.
- W2553598483 hasConceptScore W2553598483C204806902 @default.
- W2553598483 hasConceptScore W2553598483C2780746774 @default.
- W2553598483 hasConceptScore W2553598483C38652104 @default.
- W2553598483 hasConceptScore W2553598483C41008148 @default.
- W2553598483 hasConceptScore W2553598483C54569210 @default.
- W2553598483 hasConceptScore W2553598483C55439883 @default.
- W2553598483 hasConceptScore W2553598483C57795399 @default.
- W2553598483 hasConceptScore W2553598483C7646194 @default.
- W2553598483 hasConceptScore W2553598483C80444323 @default.
- W2553598483 hasConceptScore W2553598483C85847156 @default.
- W2553598483 hasConceptScore W2553598483C93974786 @default.
- W2553598483 hasLocation W25535984831 @default.
- W2553598483 hasOpenAccess W2553598483 @default.
- W2553598483 hasPrimaryLocation W25535984831 @default.
- W2553598483 hasRelatedWork W1484751769 @default.
- W2553598483 hasRelatedWork W151886262 @default.
- W2553598483 hasRelatedWork W1601043884 @default.
- W2553598483 hasRelatedWork W1993945719 @default.
- W2553598483 hasRelatedWork W2160390325 @default.
- W2553598483 hasRelatedWork W2553598483 @default.
- W2553598483 hasRelatedWork W3029690602 @default.