An efficient public key functional encryption for inner product evaluations
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Kim, Intae | - |
dc.contributor.author | Park, Jong Hwan | - |
dc.contributor.author | Hwang, Seong Oun | - |
dc.date.available | 2020-11-23T02:40:05Z | - |
dc.date.created | 2020-11-23 | - |
dc.date.issued | 2020-09 | - |
dc.identifier.issn | 0941-0643 | - |
dc.identifier.uri | https://scholarworks.bwise.kr/gachon/handle/2020.sw.gachon/79055 | - |
dc.description.abstract | As many services have changed from offline to online, a lot of personal information including user private data has been collected by and exchanged with various service providers. An issue raised in this process is that personal information can be exploited by multiple unwanted entities without the data owner's knowledge. To solve this problem, functional encryption was proposed. It is suitable for data protection because even if a third-party uses the owner's secret key for a functionf, it cannot retrieve the original messagexfrom the ciphertext. This means that information aboutxcannot be published, but is exposed only asf(x), the result of the functionf. However, previous pairing-based public key functional encryption schemes for inner product evaluations (FE-IPE) cannot be practical solutions yet because they require too much computation, communication and storage overheads. In this paper, we propose an efficient pairing-based public key FE-IPE that requires onlyn(i.e., the dimension of vectors for function and message) exponentiation plustwopairing computations for decryption with smaller sized public parameters, secret keys and ciphertexts. And this scheme supports fully collusion resistance. The proposed scheme is proven selectively secure against chosen-plaintext attacks in the standard model under the external Diffie-Hellman assumption. | - |
dc.language | 영어 | - |
dc.language.iso | en | - |
dc.publisher | SPRINGER LONDON LTD | - |
dc.relation.isPartOf | NEURAL COMPUTING & APPLICATIONS | - |
dc.title | An efficient public key functional encryption for inner product evaluations | - |
dc.type | Article | - |
dc.type.rims | ART | - |
dc.description.journalClass | 1 | - |
dc.identifier.wosid | 000560557000005 | - |
dc.identifier.doi | 10.1007/s00521-019-04440-1 | - |
dc.identifier.bibliographicCitation | NEURAL COMPUTING & APPLICATIONS, v.32, no.17, pp.13117 - 13128 | - |
dc.citation.endPage | 13128 | - |
dc.citation.startPage | 13117 | - |
dc.citation.title | NEURAL COMPUTING & APPLICATIONS | - |
dc.citation.volume | 32 | - |
dc.citation.number | 17 | - |
dc.contributor.affiliatedAuthor | Hwang, Seong Oun | - |
dc.type.docType | Article | - |
dc.subject.keywordAuthor | Functional encryption | - |
dc.subject.keywordAuthor | Pairing-based public key functional encryption | - |
dc.subject.keywordAuthor | Inner product evaluation | - |
dc.subject.keywordAuthor | Fully collusion resistance | - |
dc.subject.keywordPlus | PREDICATE ENCRYPTION | - |
dc.subject.keywordPlus | SCHEME | - |
dc.relation.journalResearchArea | Computer Science | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Artificial Intelligence | - |
dc.description.journalRegisteredClass | scie | - |
dc.description.journalRegisteredClass | scopus | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
1342, Seongnam-daero, Sujeong-gu, Seongnam-si, Gyeonggi-do, Republic of Korea(13120)031-750-5114
COPYRIGHT 2020 Gachon University All Rights Reserved.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.