Simple Functional Encryption Schemes for Inner Products, Lecture Notes in Computer Science, vol.9020, pp.733-751, 2015. ,
URL : https://hal.archives-ouvertes.fr/hal-01108287
From Single-Input to Multi-client Inner-Product Functional Encryption, Lecture Notes in Computer Science, vol.11923, pp.552-582, 2019. ,
URL : https://hal.archives-ouvertes.fr/hal-02135963
Decentralizing Inner-Product Functional Encryption, Public-Key Cryptography ? PKC 2019, vol.11443, pp.128-157, 2019. ,
URL : https://hal.archives-ouvertes.fr/hal-02317011
Multi-input functional encryption for inner products: Function-hiding realizations and constructions without pairings, CRYPTO 2018, Part I, volume 10991 of LNCS, pp.597-627, 2018. ,
Multi-input Inner-Product Functional Encryption from Pairings, Lecture Notes in Computer Science, pp.601-626, 2017. ,
URL : https://hal.archives-ouvertes.fr/hal-01380735
Fully Secure Functional Encryption for Inner Products, from Standard Assumptions, Advances in Cryptology ? CRYPTO 2016, vol.9816, pp.333-362, 2016. ,
URL : https://hal.archives-ouvertes.fr/hal-01228559
Functional Encryption for Bounded Collusions, Revisited, Theory of Cryptography, vol.10677, pp.173-205, 2017. ,
A Simple Public-Key Cryptosystem with a Double Trapdoor Decryption Mechanism and Its Applications, Advances in Cryptology - ASIACRYPT 2003, vol.2894, pp.37-54, 2003. ,
On Extractability Obfuscation, Theory of Cryptography, vol.8349, pp.52-73, 2014. ,
Identity-Based Encryption from the Weil Pairing, Advances in Cryptology ? CRYPTO 2001, vol.2139, pp.213-229, 2001. ,
Functional Encryption: Definitions and Challenges, Theory of Cryptography, vol.6597, pp.253-273, 2011. ,
Decentralized multi-client functional encryption for inner product, ASIACRYPT 2018, Part II, vol.11273, pp.703-732, 2018. ,
Clifford Cocks. An identity based encryption scheme based on quadratic residues, 8th IMA International Conference on Cryptography and Coding, vol.2260, pp.360-363, 1021. ,
An algebraic framework for Diffie-Hellman assumptions, CRYPTO 2013, Part II, vol.8043, pp.129-147, 2013. ,
Multi-input functional encryption, LNCS, vol.8441, pp.578-602, 2014. ,
Candidate indistinguishability obfuscation and functional encryption for all circuits, 54th FOCS, pp.40-49, 2013. ,
Attribute-based encryption for fine-grained access control of encrypted data, Proceedings of the 13th ACM conference on Computer and communications security - CCS '06, pp.89-98, 2006. ,