Filters








4,042 Hits in 4.0 sec

Function-Hiding Inner Product Encryption Is Practical [chapter]

Sam Kim, Kevin Lewi, Avradip Mandal, Hart Montgomery, Arnab Roy, David J. Wu
2018 Lecture Notes in Computer Science  
An inner product encryption scheme is function-hiding if the keys and ciphertexts reveal no additional information about both x and y beyond their inner product.  ...  Finally, we evaluate the practicality of our encryption scheme by implementing our function-hiding inner product encryption scheme.  ...  The reduction to function-hiding inner product encryption is very simple and resembles the "brute-force" construction of functional encryption from [BSW11, §4.1].  ... 
doi:10.1007/978-3-319-98113-0_29 fatcat:3f6jf3igaza23nid3qgnzblbgq

Controlled Functional Encryption

Muhammad Naveed, Shashank Agrawal, Manoj Prabhakaran, XiaoFeng Wang, Erman Ayday, Jean-Pierre Hubaux, Carl Gunter
2014 Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security - CCS '14  
As in functional encryption, C-FE allows a user (client) to learn only certain functions of encrypted data, using keys obtained from an authority.  ...  new cryptographic tool called Controlled Functional Encryption (C-FE).  ...  We point out that this function is different from the inner product predicate considered in the functional encryption literature, which only computes whether the inner product is zero or not: the two functions  ... 
doi:10.1145/2660267.2660291 dblp:conf/ccs/NaveedAPWAHG14 fatcat:v5aalr2t6faj3kzcdvigqd5z6u

Decentralized Policy-Hiding ABE with Receiver Privacy [chapter]

Yan Michalevsky, Marc Joye
2018 Lecture Notes in Computer Science  
Our construction is based on a decentralized inner-product predicate encryption scheme, introduced in this paper, which hides the encryption policy.  ...  We present the first practical decentralized ABE scheme with a proof of being policy-hiding.  ...  An important subclass of functional encryption is Predicate Encryption (PE) [7, 16] , and in particular Inner-Product Predicate Encryption (IPPE), where data can be accessed if and only if the ciphertext  ... 
doi:10.1007/978-3-319-98989-1_27 fatcat:kqnmppn3sfdeddk543vhkdgxay

Efficient Function-Hiding Functional Encryption: From Inner-Products to Orthogonality

Manuel Barbosa, Dario Catalano, Azam Soleimanian, Bogdan Warinschi
2019 Zenodo  
Our implementation shows that the first scheme is extremely fast and ready to be deployed in practical applications.  ...  Our main contribution are two such schemes, both rooted in existing constructions of FE for inner products (IPFE), i.e., where decryption keys reveal the inner product of x and y.  ...  The first author is financed by Project NanoSTIMA (NORTE-01-0145-FEDER-000016) through the North Portugal Regional Operational Programme (NORTE 2020), under the PORTUGAL 2020 Partnership Agreement and  ... 
doi:10.5281/zenodo.3405909 fatcat:3j27w653fjdjtc4r7wxterqhbm

Function-Private Subspace-Membership Encryption and Its Applications [chapter]

Dan Boneh, Ananth Raghunathan, Gil Segev
2013 Lecture Notes in Computer Science  
Then, we present a generic construction of a function-private subspace-membership encryption scheme based on any inner-product encryption scheme.  ...  First, we consider the notion of subspace-membership encryption, a generalization of inner-product encryption, and formalize a meaningful and realistic notion for capturing its function privacy.  ...  A Function-Private Construction from Inner-product Encryption.  ... 
doi:10.1007/978-3-642-42033-7_14 fatcat:jta3wmrqtre53fyyas5tieb5tq

Multi-Input Functional Encryption for Inner Products: Function-Hiding Realizations and Constructions without Pairings

Michel Abdalla, Dario Catalano, Dario Fiore, Romain Gay, Bodgan Ursu
2019 Zenodo  
Our second main contribution is the rst function-hiding MIFE scheme for inner products based on standard assumptions.  ...  First, we put forward a novel methodology to convert single-input functional encryption for inner products into multi-input schemes for the same functionality.  ...  Sequence of games for transforming a weak multi-input function-hiding inner-product encryption scheme into a full function-hiding one.  ... 
doi:10.5281/zenodo.3406014 fatcat:vvzfkpgnuvd55hs2tmkdfklmqi

A survey on Functional Encryption [article]

Carla Mascia, Massimiliano Sala, Irene Villa
2021 arXiv   pre-print
Functional Encryption (FE) expands traditional public-key encryption in two different ways: it supports fine-grained access control and it allows to learn a function of the encrypted data.  ...  To our knowledge, this is the first survey that encompasses the entire FE family.  ...  We acknowledge the financial support from BV TECH Spa under the project "Algebraic methods for Cloud Encryption".  ... 
arXiv:2106.06306v1 fatcat:i76bnyo2uvak5plpyexpntwb74

A survey on functional encryption

Carla Mascia, Massimiliano Sala, Irene Villa
2021 Advances in Mathematics of Communications  
<p style='text-indent:20px;'>Functional Encryption (FE) expands traditional public-key encryption in two different ways: it supports fine-grained access control and allows learning a function of the encrypted  ...  To our knowledge, this is the first survey that encompasses the entire FE family.</p>  ...  Function-hiding inner product encryption. As reported in [32] , in many real scenarios it is important to consider also the privacy of the computed function.  ... 
doi:10.3934/amc.2021049 fatcat:l3j4d2kfwrbdvk7ff4hrg7leo4

Privacy-Preserving Outsourced Inner Product Computation on Encrypted Database

Haining Yang, Ye Su, Jing Qin, Huaxiong Wang
2020 IEEE Transactions on Dependable and Secure Computing  
We propose a construction under this model for the inner product computation by using the Inner Product Functional Encryption (IPFE) as a building block.  ...  We construct a new IPFE scheme and use it to construct an efficient outsourced inner product computation scheme.  ...  This work is supported by National Natural Science Foundation of China under Grant  ... 
doi:10.1109/tdsc.2020.3001345 fatcat:btoyuxryz5b6nnj6akejx4rq2u

Non-zero Inner Product Encryptions: Strong Security under Standard Assumptions [article]

Tapas Pal, Ratna Dutta
2019 IACR Cryptology ePrint Archive  
In addition, utilizing inner product functional encryptions we provide attributehiding public-key NIPEs depending on the DDH, DDH-f, HSM, LWE, Decision Composite Reciprocity assumptions and establish full-hiding  ...  Non-zero inner product encryption (NIPE) allows a user to encrypt a message with its attribute vector and decryption is possible using a secret-key associated with a predicate vector if the inner product  ...  of the vectors is called inner product functional encryption (IPFE).  ... 
dblp:journals/iacr/PalD19 fatcat:b5zttki325bmhagh7o6zo5gu5e

Privacy-Enhanced Machine Learning with Functional Encryption

Tilen Marc, Miha Stopar, Jan Hartman, Manca Bizjak, Jolanda Modic
2019 Zenodo  
Functional ENcryption is a generalization of public-key encryption in which possessing a secret functional key allows one to learn a function of what the ciphertext is encrypting.  ...  This paper introduces the first fully-fledged open source cryptographic libraries for functional encryption.  ...  -Multi-Input Functional Encryption for Inner Products: Function-Hiding Realizations and Constructions without Pairings [3] .  ... 
doi:10.5281/zenodo.3551691 fatcat:bta45eskejdnlc3btbieo26hka

Decentralized Policy-Hiding Attribute-Based Encryption with Receiver Privacy [article]

Yan Michalevsky, Marc Joye
2018 IACR Cryptology ePrint Archive  
Our construction is based on a decentralized inner-product predicate encryption scheme, introduced in this paper, which hides the encryption policy.  ...  We present the first practical decentralized ABE scheme with a proof of being policy-hiding.  ...  Such strong hiding is provided in a singleauthority setting by the inner-product predicate encryption scheme of Katz et al. [17] .  ... 
dblp:journals/iacr/MichalevskyJ18 fatcat:yo3k3jzrb5hnbnwz5rz6j2dzsy

Fully Secure Unbounded Inner-Product and Attribute-Based Encryption [chapter]

Tatsuaki Okamoto, Katsuyuki Takashima
2012 Lecture Notes in Computer Science  
In our unbounded IPE schemes, the inner-product relation is generalized, where the two vectors of inner-product can be different sizes and it provides a great improvement of efficiency in many applications  ...  In this paper, we present the first inner-product encryption (IPE) schemes that are unbounded in the sense that the public parameters do not impose additional limitations on the predicates and attributes  ...  Definitions of Generalized Inner-Product Encryption (IPE) and Attribute-Based Encryption (ABE) Generalized Inner-Product Encryption This section defines generalized inner product encryption (IPE) and  ... 
doi:10.1007/978-3-642-34961-4_22 fatcat:6n2xro2kjvetrexnkk43wc4hkm

Practical Inner Product Encryption with Constant Private Key

Yi-Fan Tseng, Zi-Yuan Liu, Raylin Tso
2020 Applied Sciences  
Inner product encryption, first introduced by Katz et al., is a type of predicate encryption in which a ciphertext and a private key correspond to an attribute vector and a predicate vector, respectively  ...  To resolve this problem, we introduce an efficient inner product encryption approach in this work.  ...  Introduction Inner product encryption (IPE), first introduced by Katz et al.  ... 
doi:10.3390/app10238669 fatcat:5epy6drkdngpnpmfmkrzlw5yba

On the Practical Security of Inner Product Functional Encryption [chapter]

Shashank Agrawal, Shweta Agrawal, Saikrishna Badrinarayanan, Abishek Kumarasubramanian, Manoj Prabhakaran, Amit Sahai
2015 Lecture Notes in Computer Science  
In this work we explore the security of Inner Product Functional Encryption schemes with the goal of achieving the highest security against practically feasible attacks.  ...  We study real world loss-of-secrecy attacks against Functional Encryption for Inner Product predicates constructed over elliptic curve groups.  ...  Functional Encryption for Inner Products over Prime Order Groups We present a new functional encryption scheme for inner products in the encryption key setting from prime order bilinear groups.  ... 
doi:10.1007/978-3-662-46447-2_35 fatcat:fqq5oehtpbaa7jpnqacrel3dni
« Previous Showing results 1 — 15 out of 4,042 results