SCIENCE CHINA Information Sciences, Volume 61 , Issue 5 : 058101(2018) https://doi.org/10.1007/s11432-017-9120-4

LR-RRA-CCA secure functional encryption for randomized functionalities from trapdoor HPS and LAF

More info
  • ReceivedMay 16, 2017
  • AcceptedMay 31, 2017
  • PublishedAug 30, 2017


There is no abstract available for this article.


This work was supported by National Natural Science Foundation of China (Grant Nos. 61472114, 61572318, 61702007, 61133014, 61502400), National Key Research and Development Program of China (Grant No. 2017YFB0802003), and other foundations (Grant Nos. 16ZB0140, LD14127X, ZRC2013380).



[1] Boneh D, Sahai A, Waters B, et al. Functional encryption: definitions and challenges. In: Proceedings of the 8th Conference on Theory of Cryptography (TCC'11). Berlin: Springer-Verlag, 2011. 253--273. Google Scholar

[2] Agrawal S, Gorbunov S, Vaikuntanathan V, et al. Cryptographic agents: towards a unified theory of computing on encrypted data. In: Advances in Cryptology — EUROCRYPT 2015. Berlin: Springer-Verlag, 2015. 501--531. Google Scholar

[3] Ananth P, Brakerski Z, Segev G, et al. From selective to adaptive security in functional encryption. In: Advances in Cryptology — CRYPTO 2015. Berlin: Springer-Verlag, 2015. 657--677. Google Scholar

[4] Goyal V, Jain A, Koppula V, et al. Functional encryption for randomized functionalities. In: Theory of Cryptography. Berlin: Springer-Verlag, 2015. 325--351. Google Scholar

[5] Agrawal S, Wu D J. Functional encryption: deterministic to randomized functions from simple assumptions. In: Advances in Cryptology — EUROCRYPT 2017. Berlin: Springer-Verlag, 2017. 30--61. Google Scholar

[6] Qin B D, Liu S L. Leakage-resilient chosen-ciphertext secure public-key encryption from Hash proof system and one-time lossy filter. In: Advances in Cryptology — ASIACRYPT 2013. Berlin: Springer-Verlag, 2013. 381--400. Google Scholar

[7] Hofheinz H. Circular chosen-ciphertext security with compact ciphertexts. In: Advances in Cryptology — EUROCRYPT 2013. Berlin: Springer-Verlag, 2013. 520--536. Google Scholar