ternational Proceedings in Informatics, volume 80.
Schloss Dagstuhl-Leibniz-Zentrum fuer Informatik.
Badrinarayanan, S., Goyal, V., Jain, A., and Sahai, A.
(2016). Verifiable functional encryption. In Interna-
tional Conference on the Theory and Application of
Cryptology and Information Security, pages 557–587.
Springer.
Baltico, C. E. Z., Catalano, D., Fiore, D., and Gay, R.
(2017). Practical functional encryption for quadratic
functions with applications to predicate encryption. In
Annual International Cryptology Conference, pages
67–98. Springer.
Bernstein, D. J., Heninger, N., Lange, T., Garg, S., Gentry,
C., Halevi, S., Raykova, M., Sahai, A., and Waters,
B. (2013). Candidate indistinguishability obfuscation
and functional encryption for all circuits.
Bethencourt, J., Sahai, A., and Waters, B. (2007).
Ciphertext-policy attribute-based encryption. In 2007
IEEE symposium on security and privacy (SP’07),
pages 321–334. IEEE.
Boneh, D., Sahai, A., and Waters, B. (2011). Functional
encryption: Definitions and challenges. In Theory of
Cryptography Conference, pages 253–273. Springer.
Boyle, E., Chung, K.-M., and Pass, R. (2014). On ex-
tractability obfuscation. In Theory of Cryptography
Conference, pages 52–73. Springer.
Brakerski, Z., Komargodski, I., and Segev, G. (2018).
Multi-input functional encryption in the private-key
setting: Stronger security from weaker assumptions.
Journal of Cryptology, 31(2):434–520.
Chase, M. (2007). Multi-authority attribute based encryp-
tion. In Theory of cryptography conference, pages
515–534. Springer.
Chen, Y., Gentry, C., and Halevi, S. (2017). Cryptanalyses
of candidate branching program obfuscators. In An-
nual International Conference on the Theory and Ap-
plications of Cryptographic Techniques, pages 278–
307. Springer.
Cheon, J. H., Han, K., Lee, C., Ryu, H., and Stehlé, D.
(2015). Cryptanalysis of the multilinear map over
the integers. In Annual International Conference on
the Theory and Applications of Cryptographic Tech-
niques, pages 3–12. Springer.
Cheung, L. and Newport, C. (2007). Provably secure ci-
phertext policy abe. In Proceedings of the 14th ACM
conference on Computer and communications secu-
rity, pages 456–465. ACM.
Chotard, J., Sans, E. D., Gay, R., Phan, D. H., and
Pointcheval, D. (2018). Decentralized multi-client
functional encryption for inner product. In Interna-
tional Conference on the Theory and Application of
Cryptology and Information Security, pages 703–732.
Springer.
Coron, J.-S., Lee, M. S., Lepoint, T., and Tibouchi, M.
(2016). Cryptanalysis of ggh15 multilinear maps.
In Annual Cryptology Conference, pages 607–628.
Springer.
Garg, S., Gentry, C., Halevi, S., Raykova, M., Sahai, A.,
and Waters, B. (2016). Candidate indistinguishability
obfuscation and functional encryption for all circuits.
SIAM Journal on Computing, 45(3):882–929.
Goldwasser, S., Gordon, S. D., Goyal, V., Jain, A., Katz, J.,
Liu, F.-H., Sahai, A., Shi, E., and Zhou, H.-S. (2014).
Multi-input functional encryption. In Annual Interna-
tional Conference on the Theory and Applications of
Cryptographic Techniques, pages 578–602. Springer.
Goldwasser, S., Kalai, Y., Popa, R. A., Vaikuntanathan, V.,
and Zeldovich, N. (2013a). Reusable garbled circuits
and succinct functional encryption. In Proceedings of
the forty-fifth annual ACM symposium on Theory of
computing, pages 555–564. ACM.
Goldwasser, S., Kalai, Y. T., Popa, R. A., Vaikuntanathan,
V., and Zeldovich, N. (2013b). How to run turing ma-
chines on encrypted data. In Annual Cryptology Con-
ference, pages 536–553. Springer.
Gorbunov, S., Vaikuntanathan, V., and Wee, H. (2012).
Functional encryption with bounded collusions via
multi-party computation. In Annual Cryptology Con-
ference, pages 162–179. Springer.
Goyal, V., Pandey, O., Sahai, A., and Waters, B. (2006).
Attribute-based encryption for fine-grained access
control of encrypted data. In Proceedings of the 13th
ACM conference on Computer and communications
security, pages 89–98. Acm.
Okamoto, T. and Takashima, K. (2010). Fully secure func-
tional encryption with general relations from the deci-
sional linear assumption. In Annual cryptology con-
ference, pages 191–208. Springer.
O’Neill, A. (2010). Definitional issues in functional encryp-
tion. IACR Cryptology ePrint Archive, 2010:556.
Ostrovsky, R., Sahai, A., and Waters, B. (2007). Attribute-
based encryption with non-monotonic access struc-
tures. In Proceedings of the 14th ACM conference on
Computer and communications security, pages 195–
203. ACM.
Sahai, A. and Seyalioglu, H. (2010). Worry-free encryption:
functional encryption with public keys. In Proceed-
ings of the 17th ACM conference on Computer and
communications security, pages 463–472. ACM.
Sahai, A. and Waters, B. (2005). Fuzzy identity-based
encryption. In Annual International Conference on
the Theory and Applications of Cryptographic Tech-
niques, pages 457–473. Springer.
Waters, B. (2011). Ciphertext-policy attribute-based en-
cryption: An expressive, efficient, and provably se-
cure realization. In International Workshop on Public
Key Cryptography, pages 53–70. Springer.
Waters, B. (2015). A punctured programming approach to
adaptively secure functional encryption. In Annual
Cryptology Conference, pages 678–697. Springer.
Yamada, S., Attrapadung, N., Hanaoka, G., and Kuni-
hiro, N. (2011). Generic constructions for chosen-
ciphertext secure attribute based encryption. In In-
ternational Workshop on Public Key Cryptography,
pages 71–89. Springer.
Decentralized Multi-Client Attribute Based Functional Encryption
129