References
Boneh D, Sahai A, Waters B. Functional encryption: definitions and challenges. In: Proceedings of the 8th Theory of Cryptography Conference. 2011, 253–273
Abdalla M, Catalano D, Gay R, Ursu B. Inner-product functional encryption with fine-grained access control. In: Proceedings of the 26th International Conference on the Theory and Application of Cryptology and Information Security on Advances in Cryptology. 2020, 467–497
Wee H. Functional encryption for quadratic functions from k-lin, revisited. In: Proceedings of the 18th International Conference on Theory of Cryptography. 2020, 210–228
Chen J, Wee H. Semi-adaptive attribute-based encryption and improved delegation for Boolean formula. In: Proceedings of the 9th International Conference on Security and Cryptography for Networks. 2014, 277–297
Chen J, Gay R, Wee H. Improved dual system ABE in prime-order groups via predicate encodings. In: Proceedings of the 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques on Advances in Cryptology. 2015, 595–624
Abdalla M, Gong J, Wee H. Functional encryption for attribute-weighted sums from k-lin. In: Proceedings of the 40th Annual International Cryptology Conference on Advances in Cryptology. 2020, 685–716
Acknowledgements
This work was supported by the National Natural Science Foundation of China (61972156,62372180), the NSFC-ISF Joint Scientific Research Program (61961146004), the Innovation Program of Shanghai Municipal Education Commission (2021-01-07-00-08-E00101) and the “Digital Silk Road” Shanghai International Joint Lab of Trustworthy Intelligent Software (22510750100).
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Competing interests The authors declare that they have no competing interests or financial conflicts to disclose.
Electronic supplementary material
Rights and permissions
About this article
Cite this article
Qian, H., Lin, C., Chu, Q. et al. Partially-hiding functional encryption for degree-2 polynomials with fine-grained access control. Front. Comput. Sci. 18, 183816 (2024). https://doi.org/10.1007/s11704-023-3461-6
Received:
Accepted:
Published:
DOI: https://doi.org/10.1007/s11704-023-3461-6