Home
Publishing
DrugRxiv
Drug Repurposing
Network Medicine
About
REPO4EU
Meet the team
Drug Repurposing Research Collection
Conference
Blog
My ScienceOpen
Sign in
Register
Dashboard
Search
Home
Publishing
DrugRxiv
Drug Repurposing
Network Medicine
About
REPO4EU
Meet the team
Drug Repurposing Research Collection
Conference
My ScienceOpen
Sign in
Register
Dashboard
Search
43
views
22
references
Top references
cited by
9
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
2,419
similar
All similar
Record
: found
Abstract
: not found
Book Chapter
: not found
Theory of Cryptography
Functional Encryption Without Obfuscation
other
Author(s):
Sanjam Garg
,
Craig Gentry
,
Shai Halevi
,
Mark Zhandry
Publication date
(Online):
December 24 2015
Publisher:
Springer Berlin Heidelberg
Read this book at
Publisher
Buy book
Review
Review book
Invite someone to review
Bookmark
Cite as...
There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
Functional role of amyloid
Most cited references
22
Record
: found
Abstract
: not found
Book Chapter
: not found
Efficient Identity-Based Encryption Without Random Oracles
Brent Waters
(2005)
0
comments
Cited
153
times
– based on
0
reviews
Bookmark
Record
: found
Abstract
: not found
Conference Proceedings
: not found
Candidate Indistinguishability Obfuscation and Functional Encryption for all Circuits
Sanjam Garg
,
Craig Gentry
,
Shai Halevi
…
(2013)
0
comments
Cited
100
times
– based on
0
reviews
Bookmark
Record
: found
Abstract
: not found
Book Chapter
: not found
Functional Encryption: Definitions and Challenges
Dan Boneh
,
Amit Sahai
,
Brent Waters
(2011)
0
comments
Cited
84
times
– based on
0
reviews
Bookmark
All references
Author and book information
Book Chapter
Publication date (Print):
2016
Publication date (Online):
December 24 2015
Pages
: 480-511
DOI:
10.1007/978-3-662-49099-0_18
SO-VID:
a9f3eb49-25b6-4c70-85b1-92465de572fc
History
Data availability:
Comments
Comment on this book
Sign in to comment
Book chapters
pp. 175
Oblivious Parallel RAM and Applications
pp. 205
Oblivious Parallel RAM: Improved Efficiency and Generic Constructions
pp. 393
Optimal Computational Split-state Non-malleable Codes
pp. 480
Functional Encryption Without Obfuscation
Similar content
2,419
Science Literacy and Risk Analysis: Relationship to the Postmodernist Critique, Conservative Christian Activists, and Professional Obfuscators
Authors:
Michael Ryan
Obfuscating document stylometry to preserve author anonymity
Authors:
Michael Gamon
,
Gary Kacmarcik
Replacing a Random Oracle: Full Domain Hash from Indistinguishability Obfuscation
Authors:
Susan Hohenberger
,
Amit Sahai
,
Brent Waters
See all similar
Cited by
9
Multi-input Functional Encryption in the Private-Key Setting: Stronger Security from Weaker Assumptions
Authors:
Zvika Brakerski
,
Ilan Komargodski
,
Gil Segev
Indistinguishability Obfuscation Without Multilinear Maps: New Methods for Bootstrapping and Instantiation
Authors:
Shweta Agrawal
From Minicrypt to Obfustopia via Private-Key Functional Encryption
Authors:
Ilan Komargodski
,
Gil Segev
See all cited by