LR-RRA-CCA secure functional encryption for randomized functionalities from trapdoor HPS and LAF

  • Huige Wang
  • Kefei Chen
  • Baodong Qin
  • Ziyuan Hu



This work was supported by National Natural Science Foundation of China (Grant Nos. 61472114, 61572318, 61702007, 61133014, 61502400), National Key Research and Development Program of China (Grant No. 2017YFB0802003), and other foundations (Grant Nos. 16ZB0140, LD14127X, ZRC2013380).

Supplementary material

11432_2017_9120_MOESM1_ESM.pdf (394 kb)
Supplementary material, approximately 395 KB.


  1. 1.
    Boneh D, Sahai A, Waters B, et al. Functional encryption: definitions and challenges. In: Proceedings of the 8th Conference on Theory of Cryptography (TCC’11). Berlin: Springer-Verlag, 2011. 253–273zbMATHGoogle Scholar
  2. 2.
    Agrawal S, Gorbunov S, Vaikuntanathan V, et al. Cryptographic agents: towards a unified theory of computing on encrypted data. In: Advances in Cryptology — EUROCRYPT 2015. Berlin: Springer-Verlag, 2015. 501–531Google Scholar
  3. 3.
    Ananth P, Brakerski Z, Segev G, et al. From selective to adaptive security in functional encryption. In: Advances in Cryptology — CRYPTO 2015. Berlin: Springer-Verlag, 2015. 657–677zbMATHGoogle Scholar
  4. 4.
    Goyal V, Jain A, Koppula V, et al. Functional encryption for randomized functionalities. In: Theory of Cryptography. Berlin: Springer-Verlag, 2015. 325–351zbMATHGoogle Scholar
  5. 5.
    Agrawal S, Wu D J. Functional encryption: deterministic to randomized functions from simple assumptions. In: Advances in Cryptology — EUROCRYPT 2017. Berlin: Springer-Verlag, 2017. 30–61zbMATHGoogle Scholar
  6. 6.
    Qin B D, Liu S L. Leakage-resilient chosen-ciphertext secure public-key encryption from Hash proof system and one-time lossy filter. In: Advances in Cryptology — ASIACRYPT 2013. Berlin: Springer-Verlag, 2013. 381–400zbMATHGoogle Scholar
  7. 7.
    Hofheinz H. Circular chosen-ciphertext security with compact ciphertexts. In: Advances in Cryptology — EUROCRYPT 2013. Berlin: Springer-Verlag, 2013. 520–536zbMATHGoogle Scholar

Copyright information

© Science China Press and Springer-Verlag GmbH Germany 2017

Authors and Affiliations

  • Huige Wang
    • 1
    • 2
  • Kefei Chen
    • 3
    • 6
  • Baodong Qin
    • 4
    • 5
  • Ziyuan Hu
    • 1
  1. 1.Department of Network EngineeringAnhui Science and Technology UniversityFengyangChina
  2. 2.Department of Computer Science and EngineeringShanghai Jiao Tong UniversityShanghaiChina
  3. 3.Department of MathematicsHangzhou Normal UniversityHangzhouChina
  4. 4.National Engineering Laboratory for Wireless SecurityXi’an University of Posts and TelecommunicationsXi’anChina
  5. 5.State Key Laboratory of CryptologyBeijingChina
  6. 6.Westone Cryptologic Research CenterBeijingChina

Personalised recommendations