Skip to main content
Top
Published in:
Cover of the book

2024 | OriginalPaper | Chapter

Identity-Based Key Verifiable Inner Product Functional Encryption Scheme

Authors : Mingwu Zhang, Chao He, Gang Shen

Published in: Blockchain Technology and Emerging Applications

Publisher: Springer Nature Switzerland

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Functional encryption is a novel form of public key encryption that has captured significant attention since its inception, with researchers proposing a series of theoretical constructions. Functional encryption can be investigated for specific real-world applications such as the evaluation and output from the ciphertexts using the different decryption keys. In this paper, we investigate one of the more popular recent developments in functional encryption, i.e., inner product functional encryption. We address potential issues that inner product functional encryption might encounter in certain scenarios, including the inability to specify the identity of the ciphertext recipient, privacy leakage related to the master secret key vector, and the susceptibility of the decryption key to malicious tampering. In specific contexts, there might be a requirement for ciphertext recipients to be carefully designated. Malicious adversaries holding the decryption key can exploit it to gain insight into the master key or even alter the decryption key information. Consequently, key verification becomes necessary. To address this, we propose an identity-based key verifiable inner product functional encryption scheme (IBVE-IPE), which can effectively resolve the aforementioned issues and is validated for security and practicality through security proofs and performance analyses.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
6.
8.
go back to reference Asharov, G., Segev, G.: Limits on the power of indistinguishability obfuscation and functional encryption. SIAM J. Comput. 45(6), 2117–2176 (2016)MathSciNetCrossRef Asharov, G., Segev, G.: Limits on the power of indistinguishability obfuscation and functional encryption. SIAM J. Comput. 45(6), 2117–2176 (2016)MathSciNetCrossRef
13.
14.
go back to reference Rivest, R.L., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 21(2), 120–126 (1978)MathSciNetCrossRef Rivest, R.L., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 21(2), 120–126 (1978)MathSciNetCrossRef
15.
go back to reference Shi, E., Chan, H., Rieffel, E., Chow, R., Song, D.: Privacy-preserving aggregation of time-series data. ACM Trans. Sen. Netw 5(3), 1–36 (2009)CrossRef Shi, E., Chan, H., Rieffel, E., Chow, R., Song, D.: Privacy-preserving aggregation of time-series data. ACM Trans. Sen. Netw 5(3), 1–36 (2009)CrossRef
17.
go back to reference Wong, W.K., Cheung, D.W.l., Kao, B., Mamoulis, N.: Secure kNN computation on encrypted databases. In: Proceedings of the 2009 ACM SIGMOD International Conference on Management of data, pp. 139–152 (2009) Wong, W.K., Cheung, D.W.l., Kao, B., Mamoulis, N.: Secure kNN computation on encrypted databases. In: Proceedings of the 2009 ACM SIGMOD International Conference on Management of data, pp. 139–152 (2009)
18.
go back to reference Yang, H., Su, Y., Qin, J., Wang, H.: Privacy-preserving outsourced inner product computation on encrypted database. IEEE Trans. Dependable Secure Comput. 19(2), 1320–1337 (2020) Yang, H., Su, Y., Qin, J., Wang, H.: Privacy-preserving outsourced inner product computation on encrypted database. IEEE Trans. Dependable Secure Comput. 19(2), 1320–1337 (2020)
19.
go back to reference Zhang, M., Huang, S., Shen, G., Wang, Y.: PPNNP: a privacy-preserving neural network prediction with separated data providers using multi-client inner-product encryption. Comput. Stand. Interfaces 84, 103678 (2023)CrossRef Zhang, M., Huang, S., Shen, G., Wang, Y.: PPNNP: a privacy-preserving neural network prediction with separated data providers using multi-client inner-product encryption. Comput. Stand. Interfaces 84, 103678 (2023)CrossRef
20.
go back to reference Zhang, M., Li, Z.A., Zhang, P.: A secure and privacy-preserving word vector training scheme based on functional encryption with inner-product predicates. Comput. Stand. Interfaces 86, 103734 (2023)CrossRef Zhang, M., Li, Z.A., Zhang, P.: A secure and privacy-preserving word vector training scheme based on functional encryption with inner-product predicates. Comput. Stand. Interfaces 86, 103734 (2023)CrossRef
Metadata
Title
Identity-Based Key Verifiable Inner Product Functional Encryption Scheme
Authors
Mingwu Zhang
Chao He
Gang Shen
Copyright Year
2024
DOI
https://doi.org/10.1007/978-3-031-60037-1_1

Premium Partner