Search

Your search keyword '"Functional encryption"' showing total 689 results

Search Constraints

Start Over You searched for: Descriptor "Functional encryption" Remove constraint Descriptor: "Functional encryption"
689 results on '"Functional encryption"'

Search Results

1. Enhancing UAV‐HetNet security through functional encryption framework.

2. IPEQ: Querying Multi-attribute Records with Inner Product Encryption

3. M-Sel: A Message Selection Functional Encryption from Simple Tools

4. Payable Outsourced Decryption for Functional Encryption Using BlockChain

5. Block-Privacy: Privacy Preserving Smart Healthcare Framework: Leveraging Blockchain and Functional Encryption

6. Compact FE for unbounded attribute-weighted sums for logspace from SXDH.

7. Access control mechanism in distributed smart power plants based on blockchain and ciphertext updatable functional encryption.

8. 基于函数加密的密文卷积神经网络模型.

9. 公钥加密综述.

10. SVFGNN: A privacy-preserving vertical federated graph neural network model training framework based on split learning.

11. Functional encryption : definitional foundations and multiparty transformations

12. 可复用Garbling 的注解.

13. Robust Decentralized Multi-client Functional Encryption: Motivation, Definition, and Inner-Product Constructions

14. Registered (Inner-Product) Functional Encryption

16. Publicly Auditable Functional Encryption

20. Pattern Matching in Encrypted Stream from Inner Product Encryption

22. Unbounded Quadratic Functional Encryption and More from Pairings

23. Trustworthy Anti-Collusion Federated Learning Scheme Optimized by Game Theory.

24. On the security of functional encryption in the generic group model.

25. (Compact) Adaptively secure FE for attribute-weighted sums from k-Lin.

26. Flexible multi-client functional encryption for set intersection.

27. Efficient L p Distance Computation Using Function-Hiding Inner Product Encryption for Privacy-Preserving Anomaly Detection.

28. Compact FE for Unbounded Attribute-Weighted Sums for Logspace from SXDH

29. Collusion-Resistant Functional Encryption for RAMs

30. Bounded Functional Encryption for Turing Machines: Adaptive Security from General Assumptions

31. More Efficient Verifiable Functional Encryption

32. Feel the Quantum Functioning: Instantiating Generic Multi-Input Functional Encryption from Learning with Errors

34. Efficient Lattice-Based Inner-Product Functional Encryption

35. Adaptively Secure Laconic Function Evaluation for

36. ACR-MLM: a privacy-preserving framework for anonymous and confidential rewarding in blockchain-based multi-level marketing

37. Decentralized multi-client functional encryption for set intersection with improved efficiency.

38. Indistinguishability Obfuscation from Functional Encryption.

39. Privacy-enhanced and non-interactive linear regression with dropout-resilience.

40. A Review of Functional Encryption in IoT Applications.

41. A survey on cryptographic techniques for protecting big data security: present and forthcoming.

42. Non-Interactive Private Set Intersection From Functional Encryption

43. Efficient Multi-Client Functional Encryption for Conjunctive Equality and Range Queries

44. Efficient and privacy-preserving outsourced unbounded inner product computation in cloud computing.

45. Practical Privacy-Preserving Face Identification Based on Function-Hiding Functional Encryption

46. (Compact) Adaptively Secure FE for Attribute-Weighted Sums from k-Lin

47. An Anonymous Trace-and-Revoke Broadcast Encryption Scheme

48. Chosen Ciphertext Secure Functional Encryption from Constrained Witness PRF

49. Verifiable Functional Encryption Using Intel SGX

Catalog

Books, media, physical & digital resources