2020
DOI: 10.1007/978-3-030-45374-9_2
|View full text |Cite
|
Sign up to set email alerts
|

Adaptive Simulation Security for Inner Product Functional Encryption

Abstract: Inner product functional encryption (IPFE) [1] is a popular primitive which enables inner product computations on encrypted data. In IPFE, the ciphertext is associated with a vector x, the secret key is associated with a vector y and decryption reveals the inner product x, y. Previously, it was known how to achieve adaptive indistinguishability (IND) based security for IPFE from the DDH, DCR and LWE assumptions [8]. However, in the stronger simulation (SIM) based security game, it was only known how to support… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
7
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
5
1
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 35 publications
(7 citation statements)
references
References 48 publications
0
7
0
Order By: Relevance
“…We conjecture that our transformation from one-slot to unbounded-slot preserves adaptive security. Solving the one-slot problem would require first adapting the techniques for adaptive simulation-based security in [21,7], and more recent advances in [34] to avoid the one-use restriction.…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…We conjecture that our transformation from one-slot to unbounded-slot preserves adaptive security. Solving the one-slot problem would require first adapting the techniques for adaptive simulation-based security in [21,7], and more recent advances in [34] to avoid the one-use restriction.…”
Section: Discussionmentioning
confidence: 99%
“…We rely on an asymmetric bilinear group (G 1 , G 2 , G T , e) of prime order p where e : [22]. Our starting point is the following scheme 7 :…”
Section: One-slot Schemementioning
confidence: 99%
“…In [15], Agrawal et al provide constructions which provably achieve security against more realistic adaptive attacks, where the messages m 0 and m 1 may be adaptively chosen in the challenge phases. Later, in [14], Agrawal et al prove that the scheme in [15] achieves adaptive SIM-based security (AD-SIM) rather than just adaptive IND-based security. Moreover, they prove AD-SIM security for an unbounded number of key queries and a single challenge ciphertext, for IPE schemes, based on the DDH, DCR and LWE assumptions.…”
Section: Beyond Predicate Encryption: Inner Product Encryptionmentioning
confidence: 99%
“…IPFE is protected by selective security, whereas QFE is protected by selective as well as adaptive security against chosen-plaintext attack. There is a theoretical advancement by [4] towards making IPFE adaptively secured, but FE-based PPML works do not yet implement it. Also, information leakage proposed by [17] is the only work that discusses this concept.…”
Section: Pros and Consmentioning
confidence: 99%