Privacy-Preserving Decentralized Functional Encryption for Inner Product

被引:0
作者
Han, Jinguang [1 ]
Chen, Liqun [1 ,2 ]
Hu, Aiqun [3 ,4 ]
Chen, Liquan [4 ]
Li, Jiguo [5 ]
机构
[1] Southeast Univ, Sch Cyber Sci & Engn, Nanjing 210096, Jiangsu, Peoples R China
[2] Univ Surrey, Dept Comp Sci, Guildford GU2 7XH, Surrey, England
[3] Southeast Univ, Sch Informat Sci & Engn, Nanjing 210096, Jiangsu, Peoples R China
[4] Southeast Univ, Purple Mt Labs Network & Commun Secur, Nanjing 210096, Jiangsu, Peoples R China
[5] Fujian Normal Univ, Coll Math & Informat, Fuzhou 350117, Peoples R China
基金
国家重点研发计划; 中国国家自然科学基金;
关键词
Decentralization; functional encryption; inner production; privacy; security; IDENTITY-BASED ENCRYPTION; QUANTUM SPEEDUP; DISCRETE LOGARITHMS; SECURE; BLIND; SCHEMES; PROOFS;
D O I
10.1109/TDSC.2023.3288109
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
To support secure data mining and privacy-preserving computation, partial access and selective computation on encrypted data are desirable. Functional encryption (FE) is a new paradigm of public-key encryption and allows authorized users to compute specific functions on encrypted data without knowing the data. However, in some FE schemes, a trusted central authority (CA) is required to generate secret keys for users according to the description of functions. In this paper, to reduce trust on the CA and protect users' privacy, a privacy-preserving decentralized FE for inner product (PPDFEIP) scheme is proposed where multiple authorities co-exist and work independently without any interaction. Especially, to resist collusion attacks, all secret keys of the same user are tied to his/her global identifier (GID), but authorities cannot know any information of the GID even if they collaborate. We formalize the definition and security model of our PPFEIP scheme, and propose a concrete construction. Furthermore, the proposed scheme is implemented and evaluated. Finally, the security of our PPDFEIP scheme is reduced to well-known complexity assumptions. The novelty is to reduce trust on the CA, protect users' privacy and enable authorized users to compute inner product on encrypted data without compromising confidentiality.
引用
收藏
页码:1680 / 1694
页数:15
相关论文
共 65 条
[1]  
Abdalla M, 2019, LECT NOTES COMPUT SC, V11443, P128, DOI 10.1007/978-3-030-17259-6_5
[2]   Multi-Input Functional Encryption for Inner Products: Function-Hiding Realizations and Constructions Without Pairings [J].
Abdalla, Michel ;
Catalano, Dario ;
Fiore, Dario ;
Gay, Romain ;
Ursu, Bogdan .
ADVANCES IN CRYPTOLOGY - CRYPTO 2018, PT I, 2018, 10991 :597-627
[3]   Multi-input Inner-Product Functional Encryption from Pairings [J].
Abdalla, Michel ;
Gay, Romain ;
Raykova, Mariana ;
Wee, Hoeteck .
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2017, PT I, 2017, 10210 :601-626
[4]   Simple Functional Encryption Schemes for Inner Products [J].
Abdalla, Michel ;
Bourse, Florian ;
De Caro, Angelo ;
Pointcheval, David .
PUBLIC-KEY CRYPTOGRAPHY - PKC 2015, 2015, 9020 :733-751
[5]   On the Practical Security of Inner Product Functional Encryption [J].
Agrawal, Shashank ;
Agrawal, Shweta ;
Badrinarayanan, Saikrishna ;
Kumarasubramanian, Abishek ;
Prabhakaran, Manoj ;
Sahai, Amit .
PUBLIC-KEY CRYPTOGRAPHY - PKC 2015, 2015, 9020 :777-798
[6]   Fully Secure Functional Encryption for Inner Products, from Standard Assumptions [J].
Agrawal, Shweta ;
Libert, Benoit ;
Stehle, Damien .
ADVANCES IN CRYPTOLOGY (CRYPTO 2016), PT III, 2016, 9816 :333-362
[7]  
Agrawal S, 2013, LECT NOTES COMPUT SC, V8043, P500, DOI 10.1007/978-3-642-40084-1_28
[8]  
[Anonymous], 1993, LNCS
[9]  
[Anonymous], 2000, Rethinking public key infrastructures and digital certificates: building in privacy
[10]   Information Flow Control for Secure Cloud Computing [J].
Bacon, Jean ;
Eyers, David ;
Pasquier, Thomas F. J. -M. ;
Singh, Jatinder ;
Papagiannis, Ioannis ;
Pietzuch, Peter .
IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2014, 11 (01) :76-89