↓ Skip to main content

Theory of Cryptography

Overview of attention for book
Cover of 'Theory of Cryptography'

Table of Contents

  1. Altmetric Badge
    Book Overview
  2. Altmetric Badge
    Chapter 1 Input Locality and Hardness Amplification
  3. Altmetric Badge
    Chapter 2 General Hardness Amplification of Predicates and Puzzles
  4. Altmetric Badge
    Chapter 3 Security Amplification for the Cascade of Arbitrarily Weak PRPs: Tight Bounds via the Interactive Hardcore Lemma
  5. Altmetric Badge
    Chapter 4 Dense Model Theorems and Their Applications
  6. Altmetric Badge
    Chapter 5 Parallel Repetition for Leakage Resilience Amplification Revisited
  7. Altmetric Badge
    Chapter 6 Achieving Leakage Resilience through Dual System Encryption
  8. Altmetric Badge
    Chapter 7 Signatures Resilient to Continual Leakage on Memory and Computation
  9. Altmetric Badge
    Chapter 8 After-the-Fact Leakage in Public-Key Encryption
  10. Altmetric Badge
    Chapter 9 One-Time Computable Self-erasing Functions
  11. Altmetric Badge
    Chapter 10 Perfectly Secure Oblivious RAM without Random Oracles
  12. Altmetric Badge
    Chapter 11 Unconditional and Composable Security Using a Single Stateful Tamper-Proof Hardware Token
  13. Altmetric Badge
    Chapter 12 Correlated-Input Secure Hash Functions
  14. Altmetric Badge
    Chapter 13 Black-Box Circular-Secure Encryption beyond Affine Functions
  15. Altmetric Badge
    Chapter 14 Homomorphic Encryption: From Private-Key to Public-Key
  16. Altmetric Badge
    Chapter 15 Identity-Based Encryption Secure against Selective Opening Attack
  17. Altmetric Badge
    Chapter 16 Functional Encryption: Definitions and Challenges
  18. Altmetric Badge
    Chapter 17 Concurrent Non-Malleable Zero Knowledge with Adaptive Inputs
  19. Altmetric Badge
    Chapter 18 Round-Optimal Password-Based Authenticated Key Exchange
  20. Altmetric Badge
    Chapter 19 Bringing People of Different Beliefs Together to Do UC
  21. Altmetric Badge
    Chapter 20 Secure Two-Party Computation via Cut-and-Choose Oblivious Transfer
  22. Altmetric Badge
    Chapter 21 Practical Adaptive Oblivious Transfer from Simple Assumptions
  23. Altmetric Badge
    Chapter 22 Completeness Theorems with Constructive Proofs for Finite Deterministic 2-Party Functions
  24. Altmetric Badge
    Chapter 23 A Zero-One Law for Secure Multi-party Computation with Ternary Outputs
  25. Altmetric Badge
    Chapter 24 PCPs and the Hardness of Generating Private Synthetic Data
  26. Altmetric Badge
    Chapter 25 Limits of Computational Differential Privacy in the Client/Server Setting
  27. Altmetric Badge
    Chapter 26 Towards Privacy for Social Networks: A Zero-Knowledge Based Definition of Privacy
  28. Altmetric Badge
    Chapter 27 On the Black-Box Complexity of Optimally-Fair Coin Tossing
  29. Altmetric Badge
    Chapter 28 Theory of Cryptography
  30. Altmetric Badge
    Chapter 29 Exploring the Limits of Common Coins Using Frontier Analysis of Protocols
  31. Altmetric Badge
    Chapter 30 Limits on the Stretch of Non-adaptive Constructions of Pseudo-Random Generators
  32. Altmetric Badge
    Chapter 31 On the Complexity of Non-adaptively Increasing the Stretch of Pseudorandom Generators
  33. Altmetric Badge
    Chapter 32 Concurrent Security and Non-malleability
  34. Altmetric Badge
    Chapter 33 (Nearly) Round-Optimal Black-Box Constructions of Commitments Secure against Selective Opening Attacks
  35. Altmetric Badge
    Chapter 34 Limits on the Power of Zero-Knowledge Proofs in Cryptographic Constructions
  36. Altmetric Badge
    Chapter 35 Towards Non-Black-Box Lower Bounds in Cryptography
  37. Altmetric Badge
    Chapter 36 On Black-Box Separations among Injective One-Way Functions
  38. Altmetric Badge
    Chapter 37 Impossibility of Blind Signatures from One-Way Permutations
Attention for Chapter 16: Functional Encryption: Definitions and Challenges
Altmetric Badge

About this Attention Score

  • In the top 25% of all research outputs scored by Altmetric
  • High Attention Score compared to outputs of the same age (92nd percentile)
  • High Attention Score compared to outputs of the same age and source (94th percentile)

Mentioned by

news
1 news outlet
patent
1 patent
wikipedia
3 Wikipedia pages
q&a
1 Q&A thread

Citations

dimensions_citation
4 Dimensions

Readers on

mendeley
331 Mendeley
citeulike
2 CiteULike
You are seeing a free-to-access but limited selection of the activity Altmetric has collected about this research output. Click here to find out more.
Chapter title
Functional Encryption: Definitions and Challenges
Chapter number 16
Book title
Theory of Cryptography
Published in
Lecture notes in computer science, March 2011
DOI 10.1007/978-3-642-19571-6_16
Book ISBNs
978-3-64-219570-9, 978-3-64-219571-6
Authors

Dan Boneh, Amit Sahai, Brent Waters, Boneh, Dan, Sahai, Amit, Waters, Brent

Mendeley readers

Mendeley readers

The data shown below were compiled from readership statistics for 331 Mendeley readers of this research output. Click here to see the associated Mendeley record.

Geographical breakdown

Country Count As %
United States 3 <1%
Portugal 2 <1%
Germany 2 <1%
Brazil 2 <1%
United Kingdom 2 <1%
Netherlands 1 <1%
India 1 <1%
Japan 1 <1%
Malaysia 1 <1%
Other 2 <1%
Unknown 314 95%

Demographic breakdown

Readers by professional status Count As %
Student > Ph. D. Student 91 27%
Student > Master 52 16%
Researcher 41 12%
Student > Bachelor 33 10%
Student > Postgraduate 21 6%
Other 38 11%
Unknown 55 17%
Readers by discipline Count As %
Computer Science 208 63%
Engineering 22 7%
Mathematics 16 5%
Physics and Astronomy 8 2%
Social Sciences 3 <1%
Other 12 4%
Unknown 62 19%
Attention Score in Context

Attention Score in Context

This research output has an Altmetric Attention Score of 16. This is our high-level measure of the quality and quantity of online attention that it has received. This Attention Score, as well as the ranking and number of research outputs shown below, was calculated when the research output was last mentioned on 02 August 2022.
All research outputs
#1,967,553
of 23,009,818 outputs
Outputs from Lecture notes in computer science
#354
of 8,145 outputs
Outputs of similar age
#8,537
of 109,485 outputs
Outputs of similar age from Lecture notes in computer science
#1
of 17 outputs
Altmetric has tracked 23,009,818 research outputs across all sources so far. Compared to these this one has done particularly well and is in the 91st percentile: it's in the top 10% of all research outputs ever tracked by Altmetric.
So far Altmetric has tracked 8,145 research outputs from this source. They receive a mean Attention Score of 5.0. This one has done particularly well, scoring higher than 95% of its peers.
Older research outputs will score higher simply because they've had more time to accumulate mentions. To account for age we can compare this Altmetric Attention Score to the 109,485 tracked outputs that were published within six weeks on either side of this one in any source. This one has done particularly well, scoring higher than 92% of its contemporaries.
We're also able to compare this research output to 17 others from the same source and published within six weeks on either side of this one. This one has done particularly well, scoring higher than 94% of its contemporaries.