Skip to main content
Erschienen in: Neural Computing and Applications 17/2020

19.08.2019 | Green and Human Information Technology 2019

An efficient public key functional encryption for inner product evaluations

verfasst von: Intae Kim, Jong Hwan Park, Seong Oun Hwang

Erschienen in: Neural Computing and Applications | Ausgabe 17/2020

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

As many services have changed from offline to online, a lot of personal information including user private data has been collected by and exchanged with various service providers. An issue raised in this process is that personal information can be exploited by multiple unwanted entities without the data owner’s knowledge. To solve this problem, functional encryption was proposed. It is suitable for data protection because even if a third-party uses the owner’s secret key for a function f, it cannot retrieve the original message x from the ciphertext. This means that information about x cannot be published, but is exposed only as f(x), the result of the function f. However, previous pairing-based public key functional encryption schemes for inner product evaluations (FE-IPE) cannot be practical solutions yet because they require too much computation, communication and storage overheads. In this paper, we propose an efficient pairing-based public key FE-IPE that requires only n (i.e., the dimension of vectors for function and message) exponentiation plus two pairing computations for decryption with smaller sized public parameters, secret keys and ciphertexts. And this scheme supports fully collusion resistance. The proposed scheme is proven selectively secure against chosen-plaintext attacks in the standard model under the external Diffie–Hellman assumption.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Abdalla M, Bourse F, De Caro A, Pointcheval D (2015) Simple functional encryption schemes for inner products. In: IACR international workshop on public key cryptography. Springer, pp 733–751 Abdalla M, Bourse F, De Caro A, Pointcheval D (2015) Simple functional encryption schemes for inner products. In: IACR international workshop on public key cryptography. Springer, pp 733–751
2.
Zurück zum Zitat Abdalla M, Bourse F, De Caro A, Pointcheval D (2016) Better security for functional encryption for inner product evaluations. IACR Cryptol ePrint Arch 2016:11 Abdalla M, Bourse F, De Caro A, Pointcheval D (2016) Better security for functional encryption for inner product evaluations. IACR Cryptol ePrint Arch 2016:11
3.
Zurück zum Zitat Abdalla M, Gay R, Raykova M, Wee H (2017) Multi-input inner-product functional encryption from pairings. In: Annual international conference on the theory and applications of cryptographic techniques. Springer, pp 601–626 Abdalla M, Gay R, Raykova M, Wee H (2017) Multi-input inner-product functional encryption from pairings. In: Annual international conference on the theory and applications of cryptographic techniques. Springer, pp 601–626
4.
Zurück zum Zitat Agrawal S, Libert B, Stehlé D (2016) Fully secure functional encryption for inner products, from standard assumptions. In: Annual cryptology conference. Springer, pp 333–362 Agrawal S, Libert B, Stehlé D (2016) Fully secure functional encryption for inner products, from standard assumptions. In: Annual cryptology conference. Springer, pp 333–362
5.
Zurück zum Zitat Benhamouda F, Bourse F, Lipmaa H (2017) Cca-secure inner-product functional encryption from projective hash functions. In: IACR international workshop on public key cryptography. Springer, pp 36–66 Benhamouda F, Bourse F, Lipmaa H (2017) Cca-secure inner-product functional encryption from projective hash functions. In: IACR international workshop on public key cryptography. Springer, pp 36–66
6.
Zurück zum Zitat Bethencourt J, Sahai A, Waters B (2007) Ciphertext-policy attribute-based encryption. In: IEEE symposium on security and privacy, SP’07. IEEE, pp 321–334 Bethencourt J, Sahai A, Waters B (2007) Ciphertext-policy attribute-based encryption. In: IEEE symposium on security and privacy, SP’07. IEEE, pp 321–334
7.
Zurück zum Zitat Boneh D, Boyen X (2011) Efficient selective identity-based encryption without random oracles. J Cryptol 24(4):659–693MathSciNetCrossRef Boneh D, Boyen X (2011) Efficient selective identity-based encryption without random oracles. J Cryptol 24(4):659–693MathSciNetCrossRef
8.
Zurück zum Zitat Boneh D, Sahai A, Waters B (2011) Functional encryption: definitions and challenges. In: Theory of cryptography conference. Springer, pp 253–273 Boneh D, Sahai A, Waters B (2011) Functional encryption: definitions and challenges. In: Theory of cryptography conference. Springer, pp 253–273
9.
Zurück zum Zitat Cheung L, Newport C (2007) Provably secure ciphertext policy abe. In: Proceedings of the 14th ACM conference on computer and communications security. ACM, pp 456–465 Cheung L, Newport C (2007) Provably secure ciphertext policy abe. In: Proceedings of the 14th ACM conference on computer and communications security. ACM, pp 456–465
10.
Zurück zum Zitat Datta P, Okamoto T, Tomida J (2018) Full-hiding (unbounded) multi-input inner product functional encryption from the k-linear assumption. In: IACR international workshop on public key cryptography. Springer, pp 245–277 Datta P, Okamoto T, Tomida J (2018) Full-hiding (unbounded) multi-input inner product functional encryption from the k-linear assumption. In: IACR international workshop on public key cryptography. Springer, pp 245–277
11.
Zurück zum Zitat Katz J, Sahai A, Waters B (2008) Predicate encryption supporting disjunctions, polynomial equations, and inner products. In: Annual international conference on the theory and applications of cryptographic techniques. Springer, pp 146–162 Katz J, Sahai A, Waters B (2008) Predicate encryption supporting disjunctions, polynomial equations, and inner products. In: Annual international conference on the theory and applications of cryptographic techniques. Springer, pp 146–162
12.
Zurück zum Zitat Kim I, Hwang S (2013) An optimal identity-based broadcast encryption scheme for wireless sensor networks. IEICE Trans Commun 96(3):891–895CrossRef Kim I, Hwang S (2013) An optimal identity-based broadcast encryption scheme for wireless sensor networks. IEICE Trans Commun 96(3):891–895CrossRef
13.
Zurück zum Zitat Kim I, Hwang SO, Park JH, Park C (2016) An efficient predicate encryption with constant pairing computations and minimum costs. IEEE Trans Comput 65(10):2947–2958MathSciNetCrossRef Kim I, Hwang SO, Park JH, Park C (2016) An efficient predicate encryption with constant pairing computations and minimum costs. IEEE Trans Comput 65(10):2947–2958MathSciNetCrossRef
14.
Zurück zum Zitat Kim S, Lewi K, Mandal A, Montgomery HW, Roy A, Wu DJ (2016) Function-hiding inner product encryption is practical. IACR Cryptol ePrint Arch 2016:440MATH Kim S, Lewi K, Mandal A, Montgomery HW, Roy A, Wu DJ (2016) Function-hiding inner product encryption is practical. IACR Cryptol ePrint Arch 2016:440MATH
15.
Zurück zum Zitat Lee K, Lee DH (2018) Two-input functional encryption for inner products from bilinear maps. IEICE Trans Fund Electron Commun Comput Sci 101(6):915–928CrossRef Lee K, Lee DH (2018) Two-input functional encryption for inner products from bilinear maps. IEICE Trans Fund Electron Commun Comput Sci 101(6):915–928CrossRef
16.
Zurück zum Zitat Lewko A, Okamoto T, Sahai A, Takashima K, Waters B (2010) Fully secure functional encryption: attribute-based encryption and (hierarchical) inner product encryption. In: Annual international conference on the theory and applications of cryptographic techniques. Springer, pp 62–91 Lewko A, Okamoto T, Sahai A, Takashima K, Waters B (2010) Fully secure functional encryption: attribute-based encryption and (hierarchical) inner product encryption. In: Annual international conference on the theory and applications of cryptographic techniques. Springer, pp 62–91
17.
Zurück zum Zitat Park JH, Lee DH (2011) Fully collusion-resistant traitor tracing scheme with shorter ciphertexts. Des Codes Crypt 60(3):255–276MathSciNetCrossRef Park JH, Lee DH (2011) Fully collusion-resistant traitor tracing scheme with shorter ciphertexts. Des Codes Crypt 60(3):255–276MathSciNetCrossRef
18.
Zurück zum Zitat Pub NF (2001) Advanced encryption standard (AES). Fed Inf Process Stand Publ 197(441):0311 Pub NF (2001) Advanced encryption standard (AES). Fed Inf Process Stand Publ 197(441):0311
19.
Zurück zum Zitat Rivest RL, Shamir A, Adleman L (1978) A method for obtaining digital signatures and public-key cryptosystems. Commun ACM 21(2):120–126MathSciNetCrossRef Rivest RL, Shamir A, Adleman L (1978) A method for obtaining digital signatures and public-key cryptosystems. Commun ACM 21(2):120–126MathSciNetCrossRef
20.
Zurück zum Zitat Tomida J, Abe M, Okamoto T (2016) Adaptively secure functional encryption for inner-product values. In: Symposium on cryptography and information security Tomida J, Abe M, Okamoto T (2016) Adaptively secure functional encryption for inner-product values. In: Symposium on cryptography and information security
21.
Zurück zum Zitat Waters B (2009) Dual system encryption: realizing fully secure IBE and HIBE under simple assumptions. In: Advances in cryptology-CRYPTO 2009. Springer, pp 619–636 Waters B (2009) Dual system encryption: realizing fully secure IBE and HIBE under simple assumptions. In: Advances in cryptology-CRYPTO 2009. Springer, pp 619–636
Metadaten
Titel
An efficient public key functional encryption for inner product evaluations
verfasst von
Intae Kim
Jong Hwan Park
Seong Oun Hwang
Publikationsdatum
19.08.2019
Verlag
Springer London
Erschienen in
Neural Computing and Applications / Ausgabe 17/2020
Print ISSN: 0941-0643
Elektronische ISSN: 1433-3058
DOI
https://doi.org/10.1007/s00521-019-04440-1

Weitere Artikel der Ausgabe 17/2020

Neural Computing and Applications 17/2020 Zur Ausgabe