*. ?s-\-{i-*-},-i-<-?-ct-?-;-?s-\-{i-*-},-i->-?-sk-f, , p.1

M. Abdalla, F. Benhamouda, and R. Gay, From Single-Input to Multi-client Inner-Product Functional Encryption, Lecture Notes in Computer Science, vol.11923, pp.552-582, 2019.
URL : https://hal.archives-ouvertes.fr/hal-02135963

M. Abdalla, F. Benhamouda, M. Kohlweiss, and H. Waldner, Decentralizing inner-product functional encryption, PKC 2019, Part II, vol.11443, pp.128-157, 2019.
URL : https://hal.archives-ouvertes.fr/hal-02317011

M. Abdalla, F. Bourse, A. De-caro, and D. Pointcheval, Simple Functional Encryption Schemes for Inner Products, Lecture Notes in Computer Science, vol.9020, pp.733-751, 2015.
URL : https://hal.archives-ouvertes.fr/hal-01131971

M. Abdalla, D. Catalano, D. Fiore, R. Gay, and B. Ursu, Multi-Input Functional Encryption for Inner Products: Function-Hiding Realizations and Constructions Without Pairings, Lecture Notes in Computer Science, pp.597-627, 2018.
URL : https://hal.archives-ouvertes.fr/hal-01900273

M. Abdalla, R. Gay, M. Raykova, and H. Wee, Multi-input Inner-Product Functional Encryption from Pairings, Lecture Notes in Computer Science, pp.601-626, 2017.
URL : https://hal.archives-ouvertes.fr/hal-01524105

S. Agrawal, S. Gorbunov, V. Vaikuntanathan, and H. Wee, Functional Encryption: New Perspectives and Lower Bounds, Advances in Cryptology ? CRYPTO 2013, vol.8043, pp.500-518, 2013.

S. Agrawal, B. Libert, M. Maitra, and R. Titiu, Adaptive Simulation Security for Inner Product Functional Encryption, Lecture Notes in Computer Science, pp.34-64, 2020.
URL : https://hal.archives-ouvertes.fr/hal-02993611

S. Agrawal, B. Libert, and D. Stehlé, Fully Secure Functional Encryption for Inner Products, from Standard Assumptions, Advances in Cryptology ? CRYPTO 2016, vol.9816, pp.333-362, 2016.
URL : https://hal.archives-ouvertes.fr/hal-01228559

S. Agrawal, M. Maitra, and S. Yamada, Attribute based encryption (and more) for nondeterministic finite automata from LWE

, Advances in Cryptology ? CRYPTO 2019, CRYPTO 2019, Part II, vol.11693, pp.765-797, 2019.

S. Agrawal, M. Maitra, and S. Yamada, Attribute based encryption for deterministic finite automata from DLIN, TCC 2019, Part II, vol.11892, pp.91-117, 2019.

M. Ambrona, G. Barthe, R. Gay, and H. Wee, Attribute-based encryption in the generic group model: Automated proofs and new constructions, ACM CCS 2017, pp.647-664, 2017.
URL : https://hal.archives-ouvertes.fr/hal-01599851

C. E. Baltico, D. Catalano, D. Fiore, and R. Gay, Practical functional encryption for quadratic functions with applications to predicate encryption, Part I, vol.10401, pp.67-98, 2017.
URL : https://hal.archives-ouvertes.fr/hal-01599768

M. Ben-or, S. Goldwasser, and A. Wigderson, Completeness theorems for non-cryptographic fault-tolerant distributed computation (extended abstract), 20th ACM STOC, pp.1-10, 1988.

D. Boneh, C. Gentry, S. Gorbunov, S. Halevi, V. Nikolaenko et al., Fully keyhomomorphic encryption, arithmetic circuit ABE and compact garbled circuits, LNCS, vol.8441, pp.533-556, 2014.

D. Boneh, A. Sahai, and B. Waters, Functional encryption: Definitions and challenges, LNCS, vol.6597, pp.253-273, 2011.

Z. Brakerski and V. Vaikuntanathan, Circuit-ABE from LWE: Unbounded attributes and semi-adaptive security, CRYPTO 2016, Part III, vol.9816, pp.363-384, 2016.

J. Chen, R. Gay, and H. Wee, Improved dual system ABE in prime-order groups via predicate encodings, EUROCRYPT 2015, Part II, vol.9057, pp.595-624, 2015.
URL : https://hal.archives-ouvertes.fr/hal-01220358

J. Chen and H. Wee, Semi-adaptive attribute-based encryption and improved delegation for Boolean formula, LNCS, vol.14, pp.277-297, 2014.

Y. Chen, L. Zhang, and S. Yiu, Practical attribute based inner product functional encryption from simple assumptions, Cryptology ePrint Archive, 2019.

J. Chotard, E. Dufour, R. Sans, D. H. Gay, D. Phan et al., Decentralized multi-client functional encryption for inner product, ASIACRYPT 2018, Part II, vol.11273, pp.703-732, 2018.
URL : https://hal.archives-ouvertes.fr/hal-01668020

P. Datta, T. Okamoto, and K. Takashima, Adaptively simulation-secure attribute-hiding predicate encryption, ASIACRYPT 2018, Part II, vol.11273, pp.640-672, 2018.

A. Escala, G. Herold, E. Kiltz, C. Ràfols, and J. Villar, An algebraic framework for Diffie-Hellman assumptions, CRYPTO 2013, Part II, vol.8043, pp.129-147, 2013.

S. Goldwasser, S. D. Gordon, V. Goyal, A. Jain, J. Katz et al., Multi-input functional encryption, LNCS, vol.8441, pp.578-602, 2014.

J. Gong, B. Waters, and H. Wee, ABE for DFA from k-lin, CRYPTO 2019, Part II, vol.11693, pp.732-764, 2019.
URL : https://hal.archives-ouvertes.fr/hal-02358440

S. Gorbunov, V. Vaikuntanathan, and H. Wee, Attribute-based encryption for circuits, 45th ACM STOC, pp.545-554, 2013.

S. Gorbunov, V. Vaikuntanathan, and H. Wee, Predicate encryption for circuits from LWE, CRYPTO 2015, Part II, vol.9216, pp.503-523, 2015.
URL : https://hal.archives-ouvertes.fr/hal-01220191

R. Goyal, V. Koppula, and B. Waters, Semi-adaptive security and bundling functionalities made generic and easy, TCC 2016-B, Part II, vol.9986, pp.361-388, 2016.

V. Goyal, O. Pandey, A. Sahai, and B. Waters, Attribute-based encryption for fine-grained access control of encrypted data, Proceedings of the 13th ACM conference on Computer and communications security - CCS '06, 2006.

, Session details: Software and network exploits, Proceedings of the 13th ACM conference on Computer and communications security - CCS '06, pp.89-98, 2006.

Y. Ishai and E. Kushilevitz, Perfect Constant-Round Secure Computation via Perfect Randomizing Polynomials, Automata, Languages and Programming, vol.2380, pp.244-256, 2002.

. Springer, 35th International Conference on Coordination Chemistry (35-ICCC) 21?26 July 2002, Heidelberg, Germany, Chemistry International -- Newsmagazine for IUPAC, vol.24, issue.3, 2002.

Y. Ishai and H. Wee, Partial garbling schemes and their applications, ICALP 2014, Part I, vol.8572, pp.650-662, 2014.
URL : https://hal.archives-ouvertes.fr/hal-01094699

A. Jain, H. Lin, C. Matt, and A. Sahai, How to Leverage Hardness of Constant-Degree Expanding Polynomials over $$\mathbb {R}$$ R to build $$i\mathcal {O}$$ i O, Advances in Cryptology ? EUROCRYPT 2019, vol.11476, pp.251-281, 2019.

A. Jain, H. Lin, and A. Sahai, Simplifying constructions and assumptions for i O. IACR Cryptology ePrint Archive, p.1252, 2019.

J. Katz, A. Sahai, and B. Waters, Predicate Encryption Supporting Disjunctions, Polynomial Equations, and Inner Products, Advances in Cryptology ? EUROCRYPT 2008, vol.4965, pp.146-162

L. Kowalczyk and H. Wee, Compact adaptively secure ABE for NC 1 from k-lin, EURO-CRYPT 2019, Part I, vol.11476, pp.3-33, 2019.
URL : https://hal.archives-ouvertes.fr/hal-02358429

A. B. Lewko and B. Waters, Unbounded HIBE and attribute-based encryption, LNCS, vol.6632, pp.547-567, 2011.

H. Lin, Indistinguishability obfuscation from SXDH on 5-linear maps and locality-5 PRGs, CRYPTO 2017, Part I, vol.10401, pp.599-629, 2017.

T. Okamoto and K. Takashima, Adaptively attribute-hiding (hierarchical) inner product encryption, LNCS, vol.7237, pp.591-608, 2012.

T. Okamoto and K. Takashima, Efficient (hierarchical) inner-product encryption tightly reduced from the decisional linear assumption, IEICE Transactions, issue.1, pp.42-52, 2013.

A. Sahai and B. R. Waters, Fuzzy identity-based encryption, LNCS, vol.3494, pp.457-473, 2005.

B. Waters, Dual system encryption: Realizing fully secure IBE and HIBE under simple assumptions, LNCS, vol.5677, pp.619-636, 2009.

B. Waters, Functional encryption for regular languages, LNCS, vol.7417, pp.218-235, 2012.

H. Wee, Dual system encryption via predicate encodings, LNCS, vol.8349, pp.616-637, 2014.
URL : https://hal.archives-ouvertes.fr/hal-01094703

. Springer, , 2014.

H. Wee, sk f , f ), (ct (x i ,z i ) , (x i ) i ?[N ] )): On input key: sk f = {[K 1, TCC 2017, Part I, volume 10677 of LNCS, vol.3, pp.206-233, 2017.

. T-=-e,

. T-=-e, 2 (x i ? I m ) + K 3,2 ] 2 ) · e, vol.2

. T-=-[d-1-]-t-·-·-·,