2019
DOI: 10.1007/978-3-030-26954-8_17
|View full text |Cite
|
Sign up to set email alerts
|

Adaptively Secure and Succinct Functional Encryption: Improving Security and Efficiency, Simultaneously

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
5
2

Relationship

2
5

Authors

Journals

citations
Cited by 18 publications
(4 citation statements)
references
References 48 publications
0
4
0
Order By: Relevance
“…Our main technical insight is that we can combine the one-time secure SKE with certified deletion of [BI20] and plain PKE to construct PKE with certified deletion by a simple hybrid encryption technique if the latter satisfies receiver non-committing (RNC) security [CFGN96,JL00,CHK05]. Since it is known that PKE/SKE with RNC security can be constructed from any IND-CPA secure PKE/SKE [CHK05,KNTY19], our first result follows.…”
Section: Pke and Abe With Certified Deletion And Quantum Communicationmentioning
confidence: 94%
See 2 more Smart Citations
“…Our main technical insight is that we can combine the one-time secure SKE with certified deletion of [BI20] and plain PKE to construct PKE with certified deletion by a simple hybrid encryption technique if the latter satisfies receiver non-committing (RNC) security [CFGN96,JL00,CHK05]. Since it is known that PKE/SKE with RNC security can be constructed from any IND-CPA secure PKE/SKE [CHK05,KNTY19], our first result follows.…”
Section: Pke and Abe With Certified Deletion And Quantum Communicationmentioning
confidence: 94%
“…If we use secret key RNCE instead of public key RNCE, we can achieve reusable SKE with certified deletion via the design idea above. Secret/public key RNCE can be constructed from IND-CPA SKE/PKE, respectively [CHK05,KNTY19], and SKE with certified deletion exists unconditionally [BI20]. Thus, we can achieve PKE (resp.…”
Section: Encmentioning
confidence: 99%
See 1 more Smart Citation
“…In this section, we construct a certified everlasting RNCE scheme from a certified everlasting PKE scheme (Definition 4.1). Our construction is similar to that of the secret-key RNCE scheme presented in [KNTY19]. The difference is that we use a certified everlasting PKE scheme instead of an ordinary SKE scheme.…”
Section: Constructionmentioning
confidence: 99%