Amit Sahai, Brent Waters, Dan Boneh, Shafi Goldwasser, Yael Kalai
Derived from
Public-key encryption
Related to
Homomorphic encryption
Functional encryption (FE) is a generalization of public-key encryption in which possessing a secret key allows one to learn a function of what the ciphertext is encrypting.
and 24 Related for: Functional encryption information
Functionalencryption (FE) is a generalization of public-key encryption in which possessing a secret key allows one to learn a function of what the ciphertext...
Homomorphic encryption is a form of encryption that allows computations to be performed on encrypted data without first having to decrypt it. The resulting...
impossible to realize. FunctionalEncryption. Sahai co-authored papers which introduced attribute-based encryption and functionalencryption. Results on Zero-Knowledge...
public-key cryptography and more exotic ones such as deniable encryption and functionalencryption (which are types of cryptography that no-one previously knew...
Advanced Encryption Standard (AES), also known by its original name Rijndael (Dutch pronunciation: [ˈrɛindaːl]), is a specification for the encryption of electronic...
The Data Encryption Standard (DES /ˌdiːˌiːˈɛs, dɛz/) is a symmetric-key algorithm for the encryption of digital data. Although its short key length of...
2005, Waters first proposed the concepts of attribute-based encryption and functionalencryption with Amit Sahai. Waters was awarded the Sloan Research Fellowship...
registered by NIST and published in a FIPS. NSA encryption systems, for a historically oriented list of NSA encryption products (most of them Type 1). NSA cryptography...
This is a technical feature comparison of different disk encryption software. Hidden containers: Whether hidden containers (an encrypted container (A)...
Waters (2013). "Candidate Indistinguishability Obfuscation and FunctionalEncryption for all Circuits". 2013 IEEE 54th Annual Symposium on Foundations...
Cryptosystems (e.g., El-Gamal encryption) are designed to provide particular functionality (e.g., public key encryption) while guaranteeing certain security...
connection for which they were created and usually serve as the functionalencryption/decryption mechanism. A specific header field indicates which of...
operation over mobile data or Wi-Fi, and improved group chat functionality. End-to-end encryption is not a feature of RCS specified by GSMA, instead deferring...
of disk encryption software for Linux. Its implementation is a POSIX-compliant filesystem-level encryption layer, aiming to offer functionality similar...
feature introduced in version 3.0 of NTFS that provides filesystem-level encryption. The technology enables files to be transparently encrypted to protect...
National Security Agency took over responsibility for all U.S. Government encryption systems when it was formed in 1952. The technical details of most NSA-approved...
2013 headquartered in Plan-les-Ouates, Switzerland. It uses client-side encryption to protect email content and user data before they are sent to Proton...
CrossCrypt is an open-source on-the-fly encryption program for the Microsoft Windows XP/2000 operating systems. CrossCrypt allows a user to make virtual...
period the market for cryptography was almost entirely military, the encryption technology (techniques as well as equipment and, after computers began...
XMPP clients natively supported encryption with Google Talk's servers. It was possible to have end-to-end encryption over the Google Talk network using...
However, use of such encryption plugins makes it incompatible with other VNC programs. RealVNC offers high-strength AES encryption as part of its commercial...
crypt was a file encryption tool that used an algorithm very close to the World War II Enigma cipher. Mcrypt provides the same functionality but uses several...