Functional Encryption for Inner Product with Full Function Privacy

被引:72
作者
Datta, Pratish [1 ]
Dutta, Ratna [1 ]
Mukhopadhyay, Sourav [1 ]
机构
[1] Indian Inst Technol, Dept Math, Kharagpur 721302, W Bengal, India
来源
PUBLIC-KEY CRYPTOGRAPHY - PKC 2016, PT I | 2016年 / 9614卷
关键词
Functional encryption; Inner product; Function privacy; Asymmetric bilinear group;
D O I
10.1007/978-3-662-49384-7_7
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Functional encryption (FE) supports constrained decryption keys that allow decrypters to learn specific functions of encrypted messages. In numerous practical applications of FE, confidentiality must be assured not only for the encrypted data but also for the functions for which functional keys are provided. This paper presents a non-generic simple private key FE scheme for the inner product functionality, also known as inner product encryption (IPE). In contrast to the existing similar schemes, our construction achieves the strongest indistinguishability-based notion of function privacy in the private key setting without employing any computationally expensive cryptographic tool or nonstandard complexity assumption. Our construction is built in the asymmetric bilinear pairing group setting of prime order. The security of our scheme is based on the well-studied Symmetric External Diffie-Hellman (SXDH) assumption.
引用
收藏
页码:164 / 195
页数:32
相关论文
共 16 条
[1]   Simple Functional Encryption Schemes for Inner Products [J].
Abdalla, Michel ;
Bourse, Florian ;
De Caro, Angelo ;
Pointcheval, David .
PUBLIC-KEY CRYPTOGRAPHY - PKC 2015, 2015, 9020 :733-751
[2]  
Agrawal S, 2013, IACR CRYPTOLOGY EPRI, P744
[3]  
[Anonymous], 2010, 2010556 CRYPT EPRINT
[4]  
Bishop A., 2015, 2015672 CRYPT EPRINT
[5]  
Boneh D, 2013, LECT NOTES COMPUT SC, V8043, P461, DOI 10.1007/978-3-642-40084-1_26
[6]  
Boneh D, 2013, LECT NOTES COMPUT SC, V8269, P255, DOI 10.1007/978-3-642-42033-7_14
[7]  
Boneh D, 2011, LECT NOTES COMPUT SC, V6597, P253, DOI 10.1007/978-3-642-19571-6_16
[8]  
Boyle E, 2014, LECT NOTES COMPUT SC, V8349, P52, DOI 10.1007/978-3-642-54242-8_3
[9]  
Brakerski Z, 2015, LECT NOTES COMPUT SC, V9015, P306, DOI 10.1007/978-3-662-46497-7_12
[10]  
Datta P., 2015, TECHNICAL REPORT