The system will be going down for regular maintenance. Please save your work and logout.
Pattern Matching in Encrypted Stream from Inner Product Encryption
CASTAGNOS, Guilhem
Lithe and fast algorithmic number theory [LFANT]
Analyse cryptographique et arithmétique [CANARI]
Lithe and fast algorithmic number theory [LFANT]
Analyse cryptographique et arithmétique [CANARI]
CASTAGNOS, Guilhem
Lithe and fast algorithmic number theory [LFANT]
Analyse cryptographique et arithmétique [CANARI]
< Reduce
Lithe and fast algorithmic number theory [LFANT]
Analyse cryptographique et arithmétique [CANARI]
Language
en
Communication dans un congrès
This item was published in
Lecture Notes in Computer Science, Lecture Notes in Computer Science, PKC 2023 - 26th IACR International Conference on Practice and Theory of Public-Key Cryptography, 2023-05-07, Atlanta (Georgia). 2023-05-02, vol. 13940, p. 774-801
Springer Nature Switzerland
English Abstract
Functional encryption features secret keys, each associated with a key function f , which allow to directly recover f (x) from an encryption of x, without learning anything more about x. This property is particularly useful ...Read more >
Functional encryption features secret keys, each associated with a key function f , which allow to directly recover f (x) from an encryption of x, without learning anything more about x. This property is particularly useful when delegating data processing to a third party as it allows the latter to perform its task while ensuring minimum data leakage. However, this generic term conceals a great diversity in the cryptographic constructions that strongly differ according to the functions f they support.Read less <
English Keywords
Inner Product Encryption
Pattern Matching
Functional Encryption
Hidden Vector Encryption
ANR Project
Calcul réparti sécurisé : Cryptographie, Combinatoire, Calcul Formel - ANR-21-CE39-0006
Secure computations - ANR-22-PECY-0003
Traitement des flux chiffré s pour la gestion du trafic - ANR-19-CE39-0011
La sécurité et la privacy dans les réseaux 5G - ANR-18-CE39-0019
Secure computations - ANR-22-PECY-0003
Traitement des flux chiffré s pour la gestion du trafic - ANR-19-CE39-0011
La sécurité et la privacy dans les réseaux 5G - ANR-18-CE39-0019
Origin
Hal imported
