2013
DOI: 10.1007/978-3-642-40084-1_29
|View full text |Cite
|
Sign up to set email alerts
|

On the Achievability of Simulation-Based Security for Functional Encryption

Abstract: Abstract. Recently, there has been rapid progress in the area of functional encryption (FE), in which a receiver with secret-key sky can compute from an encryption of x the value F (x, y) for some functionality F . Two central open questions that remain are: (1) Can we construct FE secure under an indistinguishability-based (IND) security notion for general circuits? (2) To what extent can we achieve a simulation-based (SIM) security notion for FE? Indeed, it was previously shown that IND-security for FE is to… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
38
0

Year Published

2015
2015
2020
2020

Publication Types

Select...
6

Relationship

2
4

Authors

Journals

citations
Cited by 75 publications
(38 citation statements)
references
References 26 publications
0
38
0
Order By: Relevance
“…Anyway, one could object that if we instantiate the RO with any concrete hash function, the resulting scheme is not "SIM-Secure" due to the impossibility results. This problem is also shared with the constructions for the RO model of De Caro et al [8] and Boneh et al [1]. What does it mean?…”
Section: Introductionmentioning
confidence: 94%
See 4 more Smart Citations
“…Anyway, one could object that if we instantiate the RO with any concrete hash function, the resulting scheme is not "SIM-Secure" due to the impossibility results. This problem is also shared with the constructions for the RO model of De Caro et al [8] and Boneh et al [1]. What does it mean?…”
Section: Introductionmentioning
confidence: 94%
“…-Validity. We say that an adversary A in the above game is valid with respect to a checker Checker with efficient checkability if during the execution of the above game, A outputs challenge messages x 0 and x 1 of the same length and asks a set of queries K in the key space of 8 It can appear that the definition be not well-defined because we do not specify how the key k is related to the security parameter. To understand this, you may imagine that k be the code of some algorithm P (ant thus of constant-size) to compute a keyed hash function Hash(·, ·).…”
Section: Collision-resistant Indistinguishability Security For Mi-fementioning
confidence: 99%
See 3 more Smart Citations