搜索结果: 1-15 共查到“inner product encryption”相关记录16条 . 查询时间(0.089 秒)
Non-Zero Inner Product Encryption Schemes from Various Assumptions: LWE, DDH and DCR
Non-zero inner product encryption lattices generic constructions functional encryption for inner products
font style='font-size:12px;'>
2019/1/18
In non-zero inner product encryption (NIPE) schemes, ciphertexts and secret keys are associated with vectors and decryption is possible whenever the inner product of these vectors does not equal zero....
Improved Inner-product Encryption with Adaptive Security and Full Attribute-hiding
public-key cryptography Full Attribute-hiding
font style='font-size:12px;'>
2018/11/16
In this work, we propose two IPE schemes achieving both adaptive security and full attribute-hiding in the prime-order bilinear group, which improve upon the unique existing result satisfying both fea...
A New Approach for Practical Function-Private Inner Product Encryption
Functional encryption inner product encryption function privacy
font style='font-size:12px;'>
2017/2/20
Functional Encryption (FE) is a new paradigm supporting restricted decryption keys of function ff that allows one to learn f(xj)f(xj) from encryptions of messages xjxj. A natural and practical securit...
Novel Inner Product Encryption Resistant to Partial Collusion Attacks
Inner Product Encryption Selective Security Bilinear Paring
font style='font-size:12px;'>
2016/12/7
Inner product encryption (IPE) is a new cryptographic primitive initially
proposed by Abdalla et al. in 2015. IPE can be classified into public-key
IPE and secret-key IPE. The currently proposed PK-...
Function-Hiding Inner Product Encryption is Practical
functional encryption inner product encryption bilinear maps
font style='font-size:12px;'>
2016/5/5
In a functional encryption scheme, secret keys are associated with functions and ciphertexts are associated with messages. Given a secret key for a function f and a ciphertext for a message x, a decry...
More Efficient Constructions for Inner-Product Encryption
inner-product encryption attribute-hiding constant-size ciphertexts
font style='font-size:12px;'>
2016/4/12
We propose new constructions for inner product encryption -- IPE1 and IPE2, both secure under the eXternal Diffie-Hellman assumption (SXDH) in asymmetric pairing groups. The first scheme has constant-...
Improved (Hierarchical) Inner-Product Encryption from Lattices
predicate encryption (hierarchical) inner-product encryption lattices
font style='font-size:12px;'>
2016/1/3
Inner-product encryption (IPE) provides fine-grained access control and has attractive applications. Agrawal, Freeman, and Vaikuntanathan~(Asiacrypt 2011) proposed the first IPE scheme from lattices b...
Function-Hiding Inner Product Encryption
functional encryption schemes key-ciphertext
font style='font-size:12px;'>
2015/12/29
We extend the reach of functional encryption schemes that are provably secure under simple
assumptions against unbounded collusion to include function-hiding inner product schemes.
Our scheme is a p...
Bi-Deniable Inner Product Encryption from LWE
lattice-based cryptography inner product encryption bi-deniability
font style='font-size:12px;'>
2015/12/22
Deniable encryption (Canetti et al. CRYPTO ’97) is an intriguing primitive that provides a security
guarantee against not only eavesdropping attacks as required by semantic security, but also stronge...
Predicate- and Attribute-Hiding Inner Product Encryption in a Public Key Setting
inner product encryption predicate-hiding
font style='font-size:12px;'>
2014/3/6
In this paper, we propose a reasonable definition of predicate-hiding inner product encryption (IPE) in a public key setting, which we call inner product encryption with ciphertext conversion (IPE-CC)...
Achieving Short Ciphertexts or Short Secret-Keys for Adaptively Secure General Inner-Product Encryption
Inner-Product Encryption Functional Encryption Predicate Encryption
font style='font-size:12px;'>
2012/6/14
In this paper, we present two non-zero inner-product encryption (NIPE) schemes that are adaptively secure under a standard assumption, the decisional linear (DLIN) assumption, in the standard model. O...
Adaptively Attribute-Hiding (Hierarchical) Inner Product Encryption
public-key cryptography / Functional Encryption Predicate Encryption Attribute-Hiding
font style='font-size:12px;'>
2012/3/23
This paper proposes the first inner product encryption (IPE) scheme that is adaptively secure and fully attribute-hiding (attribute-hiding in the sense of the definition by Katz, Sahai and Waters), wh...
Achieving Short Ciphertexts or Short Secret-Keys for Adaptively Secure General Inner-Product Encryption
public-key cryptography / Inner-Product Encryption Functional Encryption Predicate Encryption Attribute-Hiding
font style='font-size:12px;'>
2012/3/21
In this paper, we present two non-zero inner-product encryption (NIPE) schemes that are adaptively secure under a standard assumption, the decisional linear (DLIN) assumption, in the standard model. O...
Achieving Short Ciphertexts or Short Secret-Keys for Adaptively Secure General Inner-Product Encryption
public-key cryptography / Inner-Product Encryption Functional Encryption Predicate Encryption Attribute-Hiding
font style='font-size:12px;'>
2012/3/22
In this paper, we present two non-zero inner-product encryption (NIPE) schemes that are adaptively secure under a standard assumption, the decisional linear (DLIN) assumption, in the standard model. O...
The Relation and Transformation between Hierarchical Inner Product Encryption and Spatial Encryption
public-key cryptography / Functional Encryption Hierarchical Inner Product Encryption Spatial Encryption Generic Construction
font style='font-size:12px;'>
2012/3/26
Hierarchical inner product encryption (HIPE) and spatial encryption (SE) are two important classes of functional encryption (FE) that have a large number of applications. Although HIPE and SE both inv...