{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,1,18]],"date-time":"2024-01-18T01:47:21Z","timestamp":1705542441584},"reference-count":38,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2016,8,25]],"date-time":"2016-08-25T00:00:00Z","timestamp":1472083200000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"name":"FNR, Luxembourg"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Des. Codes Cryptogr."],"published-print":{"date-parts":[[2017,9]]},"DOI":"10.1007\/s10623-016-0272-x","type":"journal-article","created":{"date-parts":[[2016,8,25]],"date-time":"2016-08-25T05:30:54Z","timestamp":1472103054000},"page":"373-399","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["On the power of rewinding simulators in functional encryption"],"prefix":"10.1007","volume":"84","author":[{"given":"Angelo","family":"De Caro","sequence":"first","affiliation":[]},{"given":"Vincenzo","family":"Iovino","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,8,25]]},"reference":[{"key":"272_CR1","doi-asserted-by":"crossref","unstructured":"Abdalla M., Bellare M., Neve G.: Robust encryption. In: Micciancio D. (ed.) TCC\u00a02010: 7th Theory of Cryptography Conference, Zurich, 9\u201311 Feb. Lecture Notes in Computer Science, vol. 5978, pp. 480\u2013497. Springer, Berlin (2010).","DOI":"10.1007\/978-3-642-11799-2_28"},{"key":"272_CR2","doi-asserted-by":"crossref","unstructured":"Agrawal S., Freeman D.M., Vaikuntanathan V.: Functional encryption for inner product predicates from learning with errors. In: Lee D.H., Wang X. (eds.) Advances in Cryptology\u2014ASIACRYPT\u00a02011, Seoul, 4\u20138 Dec 2011. Lecture Notes in Computer Science, vol. 7073, pp. 21\u201340 . Springer, Berlin (2011).","DOI":"10.1007\/978-3-642-25385-0_2"},{"key":"272_CR3","doi-asserted-by":"crossref","unstructured":"Agrawal S., Gorbunov S., Vaikuntanathan V., Wee H.: Functional encryption: new perspectives and lower bounds. In: Canetti R., Garay J.A. (eds.) Advances in Cryptology\u2014CRYPTO\u00a02013, Part II, Santa Barbara, 18\u201322 Aug 2013. Lecture Notes in Computer Science, vol. 8043, pp. 500\u2013518. Springer, Berlin (2013).","DOI":"10.1007\/978-3-642-40084-1_28"},{"key":"272_CR4","unstructured":"Agrawal S., Agrawal S., Badrinarayanan S., Kumarasubramanian A., Prabhakaran M., Sahai A.: Function private functional encryption and property preserving encryption: new definitions and positive results. Cryptology ePrint Archive, Report 2013\/744, Version posted on 6 Mar 2014. \n                        http:\/\/eprint.iacr.org\/2013\/744\/20140306:053744\n                        \n                     (2014)."},{"key":"272_CR5","doi-asserted-by":"crossref","unstructured":"Agrawal S., Agrawal S., Badrinarayanan S., Kumarasubramanian A., Prabhakaran M., Sahai A.: On the practical security of inner product functional encryption. In: Proceedings of Public-Key Cryptography\u2014PKC 2015\u201418th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, 30 Mar\u20131 Apr 2015, pp. 777\u2013798 (2015).","DOI":"10.1007\/978-3-662-46447-2_35"},{"key":"272_CR6","unstructured":"Ananth P., Boneh D., Garg S., Sahai A., Zhandry M.: Differing-inputs obfuscation and applications. Cryptology ePrint Archive, Report 2013\/689. \n                        http:\/\/eprint.iacr.org\/2013\/689\n                        \n                     (2013)."},{"key":"272_CR7","doi-asserted-by":"crossref","unstructured":"Backes M., M\u00fcller-Quade J., Unruh D.: On the necessity of rewinding in secure multiparty computation. In: Vadhan S.P. (ed.) TCC\u00a02007: 4th Theory of Cryptography Conference, Amsterdam, 21\u201324 Feb 2007. Lecture Notes in Computer Science, vol. 4392, pp. 157\u2013173. Springer, Berlin (2007).","DOI":"10.1007\/978-3-540-70936-7_9"},{"key":"272_CR8","doi-asserted-by":"crossref","unstructured":"Barbosa M., Farshim P.: On the semantic security of functional encryption schemes. In: Kurosawa K., Hanaoka G. (eds.) PKC\u00a02013: 16th International Workshop on Theory and Practice in Public Key Cryptography, Nara, 26 Feb\u20131 Mar 2013. Lecture Notes in Computer Science, vol. 7778, pp. 143\u2013161. Springer, Berlin (2013).","DOI":"10.1007\/978-3-642-36362-7_10"},{"key":"272_CR9","doi-asserted-by":"crossref","unstructured":"Barkol O., Ishai Y.: Secure computation of constant-depth circuits with applications to database search problems. In: Shoup V. (ed.) Advances in Cryptology\u2014CRYPTO\u00a02005, Santa Barbara, 14\u201318 Aug 2005. Lecture Notes in Computer Science, vol. 3621, pp. 395\u2013411. Springer, Berlin (2005).","DOI":"10.1007\/11535218_24"},{"key":"272_CR10","doi-asserted-by":"crossref","unstructured":"Bellare M., O\u2019Neill A.: Semantically-secure functional encryption: possibility results, impossibility results and the quest for a general definition. In: Proceedings of Cryptology and Network Security\u201412th International Conference, CANS 2013, Paraty, 20\u201322 Nov 2013, pp. 218\u2013234 (2013).","DOI":"10.1007\/978-3-319-02937-5_12"},{"key":"272_CR11","doi-asserted-by":"crossref","unstructured":"Bellare M., Dowsley R., Waters B., Yilek S.: Standard security does not imply security against selective-opening. In: Pointcheval D., Johansson T. (eds.) Advances in Cryptology\u2014EUROCRYPT\u00a02012, Cambridge, 15\u201319 Apr 2012. Lecture Notes in Computer Science, vol. 7237, pp. 645\u2013662. Springer, Berlin (2012).","DOI":"10.1007\/978-3-642-29011-4_38"},{"issue":"4","key":"272_CR12","doi-asserted-by":"crossref","first-page":"659","DOI":"10.1007\/s00145-010-9078-6","volume":"24","author":"D Boneh","year":"2011","unstructured":"Boneh D., Boyen X.: Efficient selective identity-based encryption without random oracles. J. Cryptol 24(4), 659\u2013693 (2011).","journal-title":"J. Cryptol"},{"key":"272_CR13","doi-asserted-by":"crossref","unstructured":"Boneh D., Franklin M.K.: Identity-based encryption from the Weil pairing. In: Kilian J. (ed.) Advances in Cryptology\u2014CRYPTO\u00a02001, Santa Barbara, 19\u201323 Aug 2001. Lecture Notes in Computer Science, vol. 2139, pp. 213\u2013229. Springer, Berlin (2001).","DOI":"10.1007\/3-540-44647-8_13"},{"key":"272_CR14","doi-asserted-by":"crossref","unstructured":"Boneh D., Waters B.: Conjunctive, subset, and range queries on encrypted data. In: Vadhan S.P. (ed.) TCC\u00a02007: 4th Theory of Cryptography Conference, Amsterdam, 21\u201324 Feb 2007. Lecture Notes in Computer Science, vol. 4392, pp. 535\u2013554. Springer, Berlin (2007).","DOI":"10.1007\/978-3-540-70936-7_29"},{"key":"272_CR15","doi-asserted-by":"crossref","unstructured":"Boneh D., Sahai A., Waters B.: Functional encryption: definitions and challenges. In: Ishai Y. (ed.) TCC\u00a02011: 8th Theory of Cryptography Conference, Providence, 28\u201330 Mar 2011. Lecture Notes in Computer Science, vol. 6597, pp. 253\u2013273. Springer, Berlin (2011).","DOI":"10.1007\/978-3-642-19571-6_16"},{"key":"272_CR16","doi-asserted-by":"crossref","unstructured":"Boyle E., Chung K.-M., Pass R.: On extractability obfuscation. In: Lindell Y. (ed.) TCC\u00a02014: 11th Theory of Cryptography Conference, San Diego, 24\u201326 Feb 2014. Lecture Notes in Computer Science, vol. 8349, pp. 52\u201373. Springer, Berlin (2014).","DOI":"10.1007\/978-3-642-54242-8_3"},{"key":"272_CR17","doi-asserted-by":"crossref","unstructured":"Cocks C.: An identity based encryption scheme based on quadratic residues. In: Honary B. (ed.) 8th IMA International Conference on Cryptography and Coding, Cirencester, 17\u201319 Dec 2001. Lecture Notes in Computer Science, vol. 2260, pp. 360\u2013363. Springer, Berlin (2001).","DOI":"10.1007\/3-540-45325-3_32"},{"key":"272_CR18","doi-asserted-by":"crossref","unstructured":"De Caro A., Iovino V., Jain A., O\u2019Neill A., Paneth O., Persiano G.: On the achievability of simulation-based security for functional encryption. In: Canetti R., Garay J.A. (eds.) Advances in Cryptology\u2014CRYPTO\u00a02013, Part II, Santa Barbara, 18\u201322 Aug 2013. Lecture Notes in Computer Science, vol. 8043, pp. 519\u2013535. Springer, Berlin (2013).","DOI":"10.1007\/978-3-642-40084-1_29"},{"key":"272_CR19","doi-asserted-by":"crossref","unstructured":"Garg S., Gentry C., Halevi S., Raykova M., Sahai A., Waters, B.: Candidate indistinguishability obfuscation and functional encryption for all circuits. In: 54th Annual Symposium on Foundations of Computer Science, Berkeley, 26\u201329 Oct 2013, pp. 40\u201349. IEEE Computer Society Press, Berkeley (2013).","DOI":"10.1109\/FOCS.2013.13"},{"key":"272_CR20","doi-asserted-by":"crossref","unstructured":"Garg S., Gentry C., Halevi S., Sahai A., Waters B.: Attribute-based encryption for circuits from multilinear maps. In: Canetti R., Garay J.A. (eds.) Advances in Cryptology\u2013CRYPTO\u00a02013, Part II, Santa Barbara, 18\u201322 Aug 2013. Lecture Notes in Computer Science, vol. 8043, pp. 479\u2013499. Springer, Berlin (2013).","DOI":"10.1007\/978-3-642-40084-1_27"},{"key":"272_CR21","doi-asserted-by":"crossref","unstructured":"Gentry C.: Practical identity-based encryption without random oracles. In: Vaudenay S. (ed.) Advances in Cryptology\u2014EUROCRYPT\u00a02006, St. Petersburg, 28 May\u20131 June 2006. Lecture Notes in Computer Science, vol. 4004, pp. 445\u2013464. Springer, Berlin (2006).","DOI":"10.1007\/11761679_27"},{"issue":"3","key":"272_CR22","doi-asserted-by":"crossref","first-page":"167","DOI":"10.1007\/s001459900010","volume":"9","author":"O Goldreich","year":"1996","unstructured":"Goldreich O., Kahan A.: How to construct constant-round zero-knowledge proof systems for NP. J. Cryptol. 9(3), 167\u2013190 (1996).","journal-title":"J. Cryptol."},{"key":"272_CR23","unstructured":"Goldreich O., Micali S., Wigderson A.: Proofs that yield nothing but their validity and a methodology of cryptographic protocol design (extended abstract). In: 27th Annual Symposium on Foundations of Computer Science, Toronto, 27\u201329 Oct 1986, pp. 174\u2013187. IEEE Computer Society Press, Berkely (1986)."},{"issue":"2","key":"272_CR24","doi-asserted-by":"crossref","first-page":"270","DOI":"10.1016\/0022-0000(84)90070-9","volume":"28","author":"S Goldwasser","year":"1984","unstructured":"Goldwasser S., Micali S.: Probabilistic encryption. J. Comput. Syst. Sci. 28(2), 270\u2013299 (1984).","journal-title":"J. Comput. Syst. Sci."},{"key":"272_CR25","unstructured":"Goldwasser S., Micali S., Rackoff C.: The knowledge complexity of interactive proof-systems (extended abstract). In: Proceedings of the 17th Annual ACM Symposium on Theory of Computing, Providence, 6\u20138 May 1985, pp. 291\u2013304 (1985)."},{"key":"272_CR26","doi-asserted-by":"crossref","unstructured":"Goldwasser S., Kalai Y.T., Popa R.A. , Vaikuntanathan V., Zeldovich N.: Reusable garbled circuits and succinct functional encryption. In: Boneh D., Roughgarden , Feigenbaum J., (eds.) 45th Annual ACM Symposium on Theory of Computing, Palo Alto, 1\u20134 June 2013, pp. 555\u2013564. ACM Press, New York (2013).","DOI":"10.1145\/2488608.2488678"},{"key":"272_CR27","doi-asserted-by":"crossref","unstructured":"Gorbunov S., Vaikuntanathan V., Wee H.: Functional encryption with bounded collusions via multi-party computation. In: Safavi-Naini R., Canetti R. (eds.) Advances in Cryptology\u2014CRYPTO\u00a02012, Santa Barbara, 19\u201323 Aug 2012. Lecture Notes in Computer Science, vol. 7417, pp. 162\u2013179. Springer, Berlin (2012).","DOI":"10.1007\/978-3-642-32009-5_11"},{"key":"272_CR28","doi-asserted-by":"crossref","unstructured":"Gorbunov S., Vaikuntanathan V., We H.: Functional encryption with bounded collusions via multi-party computation. In: Safavi-Naini R., Canetti R. (eds.) CRYPTO. Lecture Notes in Computer Science, vol. 7417, pp. 162\u2013179. Springer, Berlin (2012).","DOI":"10.1007\/978-3-642-32009-5_11"},{"key":"272_CR29","doi-asserted-by":"crossref","unstructured":"Gorbunov S., Vaikuntanathan V., Wee H.: Attribute-based encryption for circuits. In: Boneh D., Roughgarden T., Feigenbaum J. (eds.) STOC, pp. 545\u2013554. ACM, New York (2013).","DOI":"10.1145\/2488608.2488677"},{"key":"272_CR30","doi-asserted-by":"crossref","unstructured":"Goyal V., Pandey O., Sahai A., Waters B.: Attribute-based encryption for fine-grained access control of encrypted data. In: Juels A., Wright R.N., Vimercati S., (eds.) ACM CCS 06: 13th Conference on Computer and Communications Security, Alexandria, 30 Oct\u20133 Nov 2006, pp. 89\u201398. ACM Press, New York. Available as Cryptology ePrint Archive Report 2006\/309 (2006).","DOI":"10.1145\/1180405.1180418"},{"key":"272_CR31","doi-asserted-by":"crossref","unstructured":"Iovino V., \u00a0\u017bebrowski K.: Simulation-based secure functional encryption in the random oracle model. In: Proceedings of Progress in Cryptology\u2014 ATINCRYPT 2015\u20144th International Conference on Cryptology and Information Security in Latin America, Guadalajara, 23\u201326 Aug 2015, pp. 21\u201339 (2015).","DOI":"10.1007\/978-3-319-22174-8_2"},{"key":"272_CR32","doi-asserted-by":"crossref","unstructured":"Katz J., Sahai A., Waters B.: Predicate encryption supporting disjunctions, polynomial equations, and inner products. In: Smart N.P. (ed.) Advances in Cryptology\u2014EUROCRYPT\u00a02008, Istanbul, 13\u201317 Apr 2008. Lecture Notes in Computer Science, vol. 4965, pp. 146\u2013162. Springer, Berlin (2008).","DOI":"10.1007\/978-3-540-78967-3_9"},{"key":"272_CR33","unstructured":"Lewko A.B., Okamoto T., Sahai A., Takashima K., Waters B.: Fully secure functional encryption: attribute-based encryption and (hierarchical) inner product encryption. In: Gilbert H. (ed.) Advances in Cryptology\u2014EUROCRYPT\u00a02010, French Riviera, 30 May\u20133 June 2010. Lecture Notes in Computer Science, vol. 6110, pp. 62\u201391. Springer, Berlin (2010)."},{"key":"272_CR34","unstructured":"Okamoto T., Takashima K.: Adaptively attribute-hiding (hierarchical) inner product encryption. In: Pointcheval D., Johansson T. (eds.) Advances in Cryptology\u2014EUROCRYPT\u00a02012, Cambridge, 15\u201319 Apr 2012. Lecture Notes in Computer Science, vol. 7237, pp. 591\u2013608. Springer, Berlin (2012)."},{"key":"272_CR35","unstructured":"O\u2019Neill A: Definitional issues in functional encryption. Cryptology ePrint Archive, Report 2010\/556. \n                        http:\/\/eprint.iacr.org\/\n                        \n                     (2010)."},{"key":"272_CR36","doi-asserted-by":"crossref","unstructured":"Sahai A., Waters B.R.: Fuzzy identity-based encryption. In: Cramer R. (ed.) Advances in Cryptology\u2014EUROCRYPT\u00a02005, Aarhus, 22\u201326 May 2005. Lecture Notes in Computer Science, vol. 3494, pp. 457\u2013473. Springer, Berlin (2005).","DOI":"10.1007\/11426639_27"},{"key":"272_CR37","unstructured":"Shamir A.: Identity-based cryptosystems and signature schemes. In: Blakley G.R., Chaum D. (eds.) Advances in Cryptology\u2014CRYPTO\u201984, Santa Barbara, 19\u201323 Aug 1984. Lecture Notes in Computer Science, vol. 196, pp. 47\u201353. Springer, Berlin (1984)."},{"key":"272_CR38","doi-asserted-by":"crossref","unstructured":"Waters B.: Functional encryption for regular languages. In: Safavi-Naini R., Canetti R., (eds.) Advances in Cryptology\u2014CRYPTO\u00a02012, Santa Barbara, 19\u201323 Aug 2012. Lecture Notes in Computer Science, pp. 218\u2013235. Springer, Berlin (2012).","DOI":"10.1007\/978-3-642-32009-5_14"}],"container-title":["Designs, Codes and Cryptography"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10623-016-0272-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-016-0272-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-016-0272-x","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-016-0272-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,7,13]],"date-time":"2017-07-13T08:22:04Z","timestamp":1499934124000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10623-016-0272-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,8,25]]},"references-count":38,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2017,9]]}},"alternative-id":["272"],"URL":"https:\/\/doi.org\/10.1007\/s10623-016-0272-x","relation":{},"ISSN":["0925-1022","1573-7586"],"issn-type":[{"value":"0925-1022","type":"print"},{"value":"1573-7586","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,8,25]]}}}