Article PDF
Avoid common mistakes on your manuscript.
References
Boneh D, Sahai A, Waters B, et al. Functional encryption: definitions and challenges. In: Proceedings of the 8th Conference on Theory of Cryptography (TCC’11). Berlin: Springer-Verlag, 2011. 253–273
Agrawal S, Gorbunov S, Vaikuntanathan V, et al. Cryptographic agents: towards a unified theory of computing on encrypted data. In: Advances in Cryptology — EUROCRYPT 2015. Berlin: Springer-Verlag, 2015. 501–531
Ananth P, Brakerski Z, Segev G, et al. From selective to adaptive security in functional encryption. In: Advances in Cryptology — CRYPTO 2015. Berlin: Springer-Verlag, 2015. 657–677
Goyal V, Jain A, Koppula V, et al. Functional encryption for randomized functionalities. In: Theory of Cryptography. Berlin: Springer-Verlag, 2015. 325–351
Agrawal S, Wu D J. Functional encryption: deterministic to randomized functions from simple assumptions. In: Advances in Cryptology — EUROCRYPT 2017. Berlin: Springer-Verlag, 2017. 30–61
Qin B D, Liu S L. Leakage-resilient chosen-ciphertext secure public-key encryption from Hash proof system and one-time lossy filter. In: Advances in Cryptology — ASIACRYPT 2013. Berlin: Springer-Verlag, 2013. 381–400
Hofheinz H. Circular chosen-ciphertext security with compact ciphertexts. In: Advances in Cryptology — EUROCRYPT 2013. Berlin: Springer-Verlag, 2013. 520–536
Acknowledgements
This work was supported by National Natural Science Foundation of China (Grant Nos. 61472114, 61572318, 61702007, 61133014, 61502400), National Key Research and Development Program of China (Grant No. 2017YFB0802003), and other foundations (Grant Nos. 16ZB0140, LD14127X, ZRC2013380).
Author information
Authors and Affiliations
Corresponding author
Additional information
The authors declare that they have no conflict of interest.
Supporting information The supporting information is available online at info.scichina.com and link. springer.com. The supporting materials are published as submitted, without typesetting or editing. The responsibility for scientific accuracy and content remains entirely with the authors.
Electronic supplementary material
Rights and permissions
About this article
Cite this article
Wang, H., Chen, K., Qin, B. et al. LR-RRA-CCA secure functional encryption for randomized functionalities from trapdoor HPS and LAF. Sci. China Inf. Sci. 61, 058101 (2018). https://doi.org/10.1007/s11432-017-9120-4
Revised:
Accepted:
Published:
DOI: https://doi.org/10.1007/s11432-017-9120-4