An efficient public key functional encryption for inner product evaluations
- Authors
- Kim, Intae; Park, Jong Hwan; Hwang, Seong Oun
- Issue Date
- Sep-2020
- Publisher
- SPRINGER LONDON LTD
- Keywords
- Functional encryption; Pairing-based public key functional encryption; Inner product evaluation; Fully collusion resistance
- Citation
- NEURAL COMPUTING & APPLICATIONS, v.32, no.17, pp.13117 - 13128
- Journal Title
- NEURAL COMPUTING & APPLICATIONS
- Volume
- 32
- Number
- 17
- Start Page
- 13117
- End Page
- 13128
- URI
- https://scholarworks.bwise.kr/gachon/handle/2020.sw.gachon/79055
- DOI
- 10.1007/s00521-019-04440-1
- ISSN
- 0941-0643
- Abstract
- As many services have changed from offline to online, a lot of personal information including user private data has been collected by and exchanged with various service providers. An issue raised in this process is that personal information can be exploited by multiple unwanted entities without the data owner's knowledge. To solve this problem, functional encryption was proposed. It is suitable for data protection because even if a third-party uses the owner's secret key for a functionf, it cannot retrieve the original messagexfrom the ciphertext. This means that information aboutxcannot be published, but is exposed only asf(x), the result of the functionf. However, previous pairing-based public key functional encryption schemes for inner product evaluations (FE-IPE) cannot be practical solutions yet because they require too much computation, communication and storage overheads. In this paper, we propose an efficient pairing-based public key FE-IPE that requires onlyn(i.e., the dimension of vectors for function and message) exponentiation plustwopairing computations for decryption with smaller sized public parameters, secret keys and ciphertexts. And this scheme supports fully collusion resistance. The proposed scheme is proven selectively secure against chosen-plaintext attacks in the standard model under the external Diffie-Hellman assumption.
- Files in This Item
- There are no files associated with this item.
- Appears in
Collections - IT융합대학 > 컴퓨터공학과 > 1. Journal Articles
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.