Skip to main content
Log in

Partially-hiding functional encryption for degree-2 polynomials with fine-grained access control

  • Letter
  • Published:
Frontiers of Computer Science Aims and scope Submit manuscript

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

References

  1. Boneh D, Sahai A, Waters B. Functional encryption: definitions and challenges. In: Proceedings of the 8th Theory of Cryptography Conference. 2011, 253–273

  2. Abdalla M, Catalano D, Gay R, Ursu B. Inner-product functional encryption with fine-grained access control. In: Proceedings of the 26th International Conference on the Theory and Application of Cryptology and Information Security on Advances in Cryptology. 2020, 467–497

  3. Wee H. Functional encryption for quadratic functions from k-lin, revisited. In: Proceedings of the 18th International Conference on Theory of Cryptography. 2020, 210–228

  4. Chen J, Wee H. Semi-adaptive attribute-based encryption and improved delegation for Boolean formula. In: Proceedings of the 9th International Conference on Security and Cryptography for Networks. 2014, 277–297

  5. Chen J, Gay R, Wee H. Improved dual system ABE in prime-order groups via predicate encodings. In: Proceedings of the 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques on Advances in Cryptology. 2015, 595–624

  6. Abdalla M, Gong J, Wee H. Functional encryption for attribute-weighted sums from k-lin. In: Proceedings of the 40th Annual International Cryptology Conference on Advances in Cryptology. 2020, 685–716

Download references

Acknowledgements

This work was supported by the National Natural Science Foundation of China (61972156,62372180), the NSFC-ISF Joint Scientific Research Program (61961146004), the Innovation Program of Shanghai Municipal Education Commission (2021-01-07-00-08-E00101) and the “Digital Silk Road” Shanghai International Joint Lab of Trustworthy Intelligent Software (22510750100).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jie Chen.

Ethics declarations

Competing interests The authors declare that they have no competing interests or financial conflicts to disclose.

Electronic supplementary material

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Qian, H., Lin, C., Chu, Q. et al. Partially-hiding functional encryption for degree-2 polynomials with fine-grained access control. Front. Comput. Sci. 18, 183816 (2024). https://doi.org/10.1007/s11704-023-3461-6

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s11704-023-3461-6

Navigation