Two-Input Functional Encryption for Inner Products from Bilinear Maps
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Lee, Kwangsu | - |
dc.contributor.author | Lee, Dong Hoon | - |
dc.date.accessioned | 2021-09-02T10:38:52Z | - |
dc.date.available | 2021-09-02T10:38:52Z | - |
dc.date.created | 2021-06-19 | - |
dc.date.issued | 2018-06 | - |
dc.identifier.issn | 0916-8508 | - |
dc.identifier.uri | https://scholar.korea.ac.kr/handle/2021.sw.korea/75051 | - |
dc.description.abstract | Functional encryption is a new paradigm of public-key encryption that allows a user to compute f (x) on encrypted data CT (x) with a private key SKf to finely control the revealed information. Multi-input functional encryption is an important extension of (single-input) functional encryption that allows the computation f (x(1); ... ; x(n)) on multiple ciphertexts CT (x(1)); ... ; CT (x(n)) with a private key SKf. Although multi-input functional encryption has many interesting applications like running SQL queries on encrypted database and computation on encrypted stream, current candidates are not yet practical since many of them are built on indistinguishability obfuscation. To solve this unsatisfactory situation, we show that practical two-input functional encryption schemes for inner products can be built based on bilinear maps. In this paper, we first propose a two-input functional encryption scheme for inner products in composite-order bilinear groups and prove its selective IND-security under simple assumptions. Next, we propose a two-client functional encryption scheme for inner products where each ciphertext can be associated with a time period and prove its selective IND-security. Furthermore, we show that our two-input functional encryption schemes in composite-order bilinear groups can be converted into schemes in prime-order asymmetric bilinear groups by using the asymmetric property of asymmetric bilinear groups. | - |
dc.language | English | - |
dc.language.iso | en | - |
dc.publisher | IEICE-INST ELECTRONICS INFORMATION COMMUNICATIONS ENG | - |
dc.subject | PREDICATE ENCRYPTION | - |
dc.subject | SHORT CIPHERTEXTS | - |
dc.title | Two-Input Functional Encryption for Inner Products from Bilinear Maps | - |
dc.type | Article | - |
dc.contributor.affiliatedAuthor | Lee, Dong Hoon | - |
dc.identifier.doi | 10.1587/transfun.E101.A.915 | - |
dc.identifier.wosid | 000437916900006 | - |
dc.identifier.bibliographicCitation | IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, v.E101A, no.6, pp.915 - 928 | - |
dc.relation.isPartOf | IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES | - |
dc.citation.title | IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES | - |
dc.citation.volume | E101A | - |
dc.citation.number | 6 | - |
dc.citation.startPage | 915 | - |
dc.citation.endPage | 928 | - |
dc.type.rims | ART | - |
dc.type.docType | Article | - |
dc.description.journalClass | 1 | - |
dc.description.journalRegisteredClass | scie | - |
dc.description.journalRegisteredClass | scopus | - |
dc.relation.journalResearchArea | Computer Science | - |
dc.relation.journalResearchArea | Engineering | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Hardware & Architecture | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Information Systems | - |
dc.relation.journalWebOfScienceCategory | Engineering, Electrical & Electronic | - |
dc.subject.keywordPlus | PREDICATE ENCRYPTION | - |
dc.subject.keywordPlus | SHORT CIPHERTEXTS | - |
dc.subject.keywordAuthor | functional encryption | - |
dc.subject.keywordAuthor | multi-input functional encryption | - |
dc.subject.keywordAuthor | inner product | - |
dc.subject.keywordAuthor | bilinear maps | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
(02841) 서울특별시 성북구 안암로 14502-3290-1114
COPYRIGHT © 2021 Korea University. All Rights Reserved.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.