Advertisement

Simulation-based security of function-hiding inner product encryption

  • Qingsong Zhao
  • Qingkai Zeng
  • Ximeng Liu
  • Huanliang Xu
Highlight

Notes

Acknowledgements

This work was supported by National Natural Science Foundation of China (Grant Nos. 61772266, 61572248, 61431008), and Humanities and Social Science Fund of Central University Basic Scientific Research Business Expenses in Nanjing Agricultural University (Grant No. 6J0123).

Supplementary material

11432_2017_9224_MOESM1_ESM.pdf (382 kb)
Simulation-based security of function-hiding inner product encryption

References

  1. 1.
    O’Neill A. Definitional issues in functional encryption. Cryptology ePrint Archive, Report 2010/556, 2010. Http://eprint.iacr.org/2010/556Google Scholar
  2. 2.
    Boneh D, Sahai A, Waters B. Functional encryption: definitions and challenges. In: Proceedings of the 8th Conference on Theory of Cryptography, Providence, 2011. 253–273CrossRefGoogle Scholar
  3. 3.
    Abdalla M, Bourse F, de Caro A, et al. Simple functional encryption schemes for inner products. In: Proceedings of the 18th International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, 2015. 733–751Google Scholar
  4. 4.
    Bishop A, Jain A, Kowalczyk L. Function-hiding inner product encryption. In: Proceedings of the 21st International Conference on the Theory and Application of Cryptology and Information Security, Auckland, 2015. 470–491Google Scholar
  5. 5.
    Datta P, Dutta R, Mukhopadhyay S. Functional encryption for inner product with full function privacy. In: Proceedings of the 19th International Conference on the Theory and Practice of Public-Key Cryptography, Taipei, 2016. 164–195Google Scholar
  6. 6.
    Agrawal S, Libert B, Stehlé D. Fully secure functional encryption for inner products, from standard assumptions. In: Proceedings of the 36th Annual International Cryptology Conference, Santa Barbara, 2016. 333–362Google Scholar
  7. 7.
    Tomida J, Abe M, Okamoto T. Efficient functional encryption for inner-product values with full-hiding security. In: Proceedings of the 19th Information Security Conference, Honolulu, 2016. 408–425CrossRefGoogle Scholar
  8. 8.
    Kim S, Lewi K, Mandal A, et al. Functionhiding inner product encryption is practical. Cryptology ePrint Archive, Report 2016/440, 2016. Http://eprint.iacr.org/2016/440Google Scholar

Copyright information

© Science China Press and Springer-Verlag GmbH Germany, part of Springer Nature 2018

Authors and Affiliations

  • Qingsong Zhao
    • 1
    • 2
    • 4
  • Qingkai Zeng
    • 1
    • 2
  • Ximeng Liu
    • 3
  • Huanliang Xu
    • 4
  1. 1.State Key Laboratory for Novel Software TechnologyNanjing UniversityNanjingChina
  2. 2.Department of Computer Science and TechnologyNanjing UniversityNanjingChina
  3. 3.School of Information SystemsSingapore Management UniversitySingaporeSingapore
  4. 4.College of Information Science and TechnologyNanjing Agricultural UniversityNanjingChina

Personalised recommendations