Reusable garbled circuits and succinct functional encryption
Citations
817 citations
436 citations
Cites background from "Reusable garbled circuits and succi..."
...Fully-homomorphic encryption (FHE) [39] and probabilistically-checkable proofs [5, 4] are powerful tools that are often used in protocols for outsourcing computations (with integrity or confidentiality guarantees, or both) [49, 54, 2, 37, 31, 47, 41]....
[...]
368 citations
330 citations
328 citations
References
5,770 citations
4,364 citations
"Reusable garbled circuits and succi..." refers background in this paper
...We remark that functional encryption (FE) arises from, and generalizes, a beautiful sequence of papers on attribute-based encryption (including [7, 32, 33, 35, 36, 48, 54, 55]), and more generally predicate encryption (including [10, 34, 40])....
[...]
4,257 citations
"Reusable garbled circuits and succi..." refers background in this paper
...We remark that functional encryption (FE) arises from, and generalizes, a beautiful sequence of papers on attribute-based encryption (including [7, 32, 33, 35, 36, 48, 54, 55]), and more generally predicate encryption (including [10, 34, 40])....
[...]
3,610 citations
3,579 citations
"Reusable garbled circuits and succi..." refers background in this paper
...Over the years, garbled circuits and variants thereof have found many applications: two party secure protocols [58], multi-party secure protocols [24], one-time programs [27], KDM-security [5], verifiable computation [19], homomorphic computations [23] and others....
[...]
..., two party secure protocols [58], multi-party secure protocols [24]) rely on the privacy of the input or of the circuit....
[...]