Functional encryption

0Citations
Citations of this article
21Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

Functional encryption gives users fine-grained access to the encrypted data and permits the computation of specific functions on the protected plaintexts. Namely, data is encrypted using a public key, while restricted keys that correspond to particular functions are generated. This prevents the computer from computing anything other than the function specified by the restricted decrypting key. Functional encryption can handle more sophisticated data sharing involving an untrusted cloud. Finally, functional encryption is to become an increasingly valuable tool in the context of growing concern for privacy and the ubiquitous use of data.

Cite

CITATION STYLE

APA

Gay, R. (2023). Functional encryption. In Trends in Data Protection and Encryption Technologies (pp. 55–58). Springer Nature. https://doi.org/10.1007/978-3-031-33386-6_11

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free