2020
DOI: 10.1007/978-3-030-64840-4_16
|View full text |Cite
|
Sign up to set email alerts
|

Inner-Product Functional Encryption with Fine-Grained Access Control

Abstract: We construct new functional encryption schemes that combine the access control functionality of attributebased encryption with the possibility of performing linear operations on the encrypted data. While such a primitive could be easily realized from fully fledged functional encryption schemes, what makes our result interesting is the fact that our schemes simultaneously achieve all the following properties. They are public-key, efficient and can be proved secure under standard and well established assumptions… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

1
44
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
6
2
1

Relationship

1
8

Authors

Journals

citations
Cited by 47 publications
(45 citation statements)
references
References 59 publications
1
44
0
Order By: Relevance
“…In this section, we consider the security of our proposed scheme. The proof idea of IND-sAF-CKA is inspired by inner product functional encryption (IPFE) schemes (Agrawal et al, 2016, Abdalla, Catalano, Gay, & Ursu, 2020, Pal & Dutta, 2021), but we makes some modifications and improvements to them, which is suitable for our security requirements.…”
Section: Security Analysismentioning
confidence: 99%
“…In this section, we consider the security of our proposed scheme. The proof idea of IND-sAF-CKA is inspired by inner product functional encryption (IPFE) schemes (Agrawal et al, 2016, Abdalla, Catalano, Gay, & Ursu, 2020, Pal & Dutta, 2021), but we makes some modifications and improvements to them, which is suitable for our security requirements.…”
Section: Security Analysismentioning
confidence: 99%
“…Accompanying with the practical FE construction for restricted functionalities, most recent works tries to add more features to existing FE schemes such as labeled FE [Chotard et al, 2018], decentralized FE [Abdalla et al, 2019], dynamic decentralized FE [Chotard et al, 2020], and FE with access control [Abdalla et al, 2020]. The labeled FE tries to fill the gap between the multi-input and multi-client scenarios.…”
Section: Fe Scheme With Additional Featuresmentioning
confidence: 99%
“…In such a situation, a function can be generated for the expert to only look at the transmission-control protocol (TCP) port, giving the external expert the corresponding key, and restricting their access only to the desired information. Since its introduction, functional encryption has attracted a lot of interest, and its known results are broadly categorized as either focusing on feasibility results for general functionalities, or concrete, efficient realizations for restricted functionalities of practical interest [ 5 ]. In this work, we review the recent applications of functional encryption and the major cryptographic primitives that it covers.…”
Section: Introductionmentioning
confidence: 99%