Achieving IND-CCA security for functional encryption for inner products
Functional encryption allows the authorised parties to reveal partial information of the plaintext hidden in a ciphertext while in conventional encryption decryption is all-or-nothing. Focusing on the functionality of inner product evaluation (i.e. given vectors xxxx and yyyy, calculate ⟨xx,yy⟩⟨xx,y...
Saved in:
Main Authors: | , , |
---|---|
Format: | text |
Language: | English |
Published: |
Institutional Knowledge at Singapore Management University
2016
|
Subjects: | |
Online Access: | https://ink.library.smu.edu.sg/sis_research/7367 https://ink.library.smu.edu.sg/context/sis_research/article/8370/viewcontent/Achieving_IND_CCA_security_for_functional_encryption_for_inner_products.pdf |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Singapore Management University |
Language: | English |
id |
sg-smu-ink.sis_research-8370 |
---|---|
record_format |
dspace |
spelling |
sg-smu-ink.sis_research-83702022-10-13T07:48:52Z Achieving IND-CCA security for functional encryption for inner products ZHANG, Shiwei MU, Yi YANG, Guomin Functional encryption allows the authorised parties to reveal partial information of the plaintext hidden in a ciphertext while in conventional encryption decryption is all-or-nothing. Focusing on the functionality of inner product evaluation (i.e. given vectors xxxx and yyyy, calculate ⟨xx,yy⟩⟨xx,yy⟩), Abdalla et al. (PKC 2015) proposed a functional encryption scheme for inner product functionality (FE-IP) with s-IND-CPA security. In some recent works by Abdalla et al. (eprint: Report 2016/11) and Agrawal et al. (CRYPTO 2016), IND-CPA secure FE-IP schemes have also been proposed. In order to achieve Indistinguishable under Chosen Ciphertext Attacks (IND-CCA security) for FE-IP, in this paper, we propose a generic construction of FE-IP from hash proof systems. We prove the constructed FE-IP is IND-CCA secure, assuming the hardness of the subset membership problem. In addition, we give an instantiation of our generic construction from the DDH assumption. 2016-11-01T07:00:00Z text application/pdf https://ink.library.smu.edu.sg/sis_research/7367 info:doi/10.1007/978-3-319-54705-3_8 https://ink.library.smu.edu.sg/context/sis_research/article/8370/viewcontent/Achieving_IND_CCA_security_for_functional_encryption_for_inner_products.pdf http://creativecommons.org/licenses/by-nc-nd/4.0/ Research Collection School Of Computing and Information Systems eng Institutional Knowledge at Singapore Management University Functional encryption Hash proof system IND-CCA Inner product Information Security |
institution |
Singapore Management University |
building |
SMU Libraries |
continent |
Asia |
country |
Singapore Singapore |
content_provider |
SMU Libraries |
collection |
InK@SMU |
language |
English |
topic |
Functional encryption Hash proof system IND-CCA Inner product Information Security |
spellingShingle |
Functional encryption Hash proof system IND-CCA Inner product Information Security ZHANG, Shiwei MU, Yi YANG, Guomin Achieving IND-CCA security for functional encryption for inner products |
description |
Functional encryption allows the authorised parties to reveal partial information of the plaintext hidden in a ciphertext while in conventional encryption decryption is all-or-nothing. Focusing on the functionality of inner product evaluation (i.e. given vectors xxxx and yyyy, calculate ⟨xx,yy⟩⟨xx,yy⟩), Abdalla et al. (PKC 2015) proposed a functional encryption scheme for inner product functionality (FE-IP) with s-IND-CPA security. In some recent works by Abdalla et al. (eprint: Report 2016/11) and Agrawal et al. (CRYPTO 2016), IND-CPA secure FE-IP schemes have also been proposed. In order to achieve Indistinguishable under Chosen Ciphertext Attacks (IND-CCA security) for FE-IP, in this paper, we propose a generic construction of FE-IP from hash proof systems. We prove the constructed FE-IP is IND-CCA secure, assuming the hardness of the subset membership problem. In addition, we give an instantiation of our generic construction from the DDH assumption. |
format |
text |
author |
ZHANG, Shiwei MU, Yi YANG, Guomin |
author_facet |
ZHANG, Shiwei MU, Yi YANG, Guomin |
author_sort |
ZHANG, Shiwei |
title |
Achieving IND-CCA security for functional encryption for inner products |
title_short |
Achieving IND-CCA security for functional encryption for inner products |
title_full |
Achieving IND-CCA security for functional encryption for inner products |
title_fullStr |
Achieving IND-CCA security for functional encryption for inner products |
title_full_unstemmed |
Achieving IND-CCA security for functional encryption for inner products |
title_sort |
achieving ind-cca security for functional encryption for inner products |
publisher |
Institutional Knowledge at Singapore Management University |
publishDate |
2016 |
url |
https://ink.library.smu.edu.sg/sis_research/7367 https://ink.library.smu.edu.sg/context/sis_research/article/8370/viewcontent/Achieving_IND_CCA_security_for_functional_encryption_for_inner_products.pdf |
_version_ |
1770576320115245056 |