Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

An efficient public key functional encryption for inner product evaluations

Full metadata record
DC Field Value Language
dc.contributor.authorKim, Intae-
dc.contributor.authorPark, Jong Hwan-
dc.contributor.authorHwang, Seong Oun-
dc.date.available2021-03-17T06:50:20Z-
dc.date.created2021-02-26-
dc.date.issued2020-09-
dc.identifier.issn0941-0643-
dc.identifier.urihttps://scholarworks.bwise.kr/hongik/handle/2020.sw.hongik/11576-
dc.description.abstractAs many services have changed from offline to online, a lot of personal information including user private data has been collected by and exchanged with various service providers. An issue raised in this process is that personal information can be exploited by multiple unwanted entities without the data owner's knowledge. To solve this problem, functional encryption was proposed. It is suitable for data protection because even if a third-party uses the owner's secret key for a functionf, it cannot retrieve the original messagexfrom the ciphertext. This means that information aboutxcannot be published, but is exposed only asf(x), the result of the functionf. However, previous pairing-based public key functional encryption schemes for inner product evaluations (FE-IPE) cannot be practical solutions yet because they require too much computation, communication and storage overheads. In this paper, we propose an efficient pairing-based public key FE-IPE that requires onlyn(i.e., the dimension of vectors for function and message) exponentiation plustwopairing computations for decryption with smaller sized public parameters, secret keys and ciphertexts. And this scheme supports fully collusion resistance. The proposed scheme is proven selectively secure against chosen-plaintext attacks in the standard model under the external Diffie-Hellman assumption.-
dc.publisherSPRINGER LONDON LTD-
dc.titleAn efficient public key functional encryption for inner product evaluations-
dc.typeArticle-
dc.contributor.affiliatedAuthorKim, Intae-
dc.contributor.affiliatedAuthorHwang, Seong Oun-
dc.identifier.doi10.1007/s00521-019-04440-1-
dc.identifier.scopusid2-s2.0-85071134349-
dc.identifier.wosid000560557000005-
dc.identifier.bibliographicCitationNEURAL COMPUTING & APPLICATIONS, v.32, no.17, pp.13117 - 13128-
dc.relation.isPartOfNEURAL COMPUTING & APPLICATIONS-
dc.citation.titleNEURAL COMPUTING & APPLICATIONS-
dc.citation.volume32-
dc.citation.number17-
dc.citation.startPage13117-
dc.citation.endPage13128-
dc.type.rimsART-
dc.type.docTypeArticle-
dc.description.journalClass1-
dc.description.journalRegisteredClassscie-
dc.description.journalRegisteredClassscopus-
dc.relation.journalResearchAreaComputer Science-
dc.relation.journalWebOfScienceCategoryComputer Science, Artificial Intelligence-
dc.subject.keywordAuthorFunctional encryption-
dc.subject.keywordAuthorPairing-based public key functional encryption-
dc.subject.keywordAuthorInner product evaluation-
dc.subject.keywordAuthorFully collusion resistance-
Files in This Item
There are no files associated with this item.
Appears in
Collections
College of Science and Technology > Department of Computer and Information Communications Engineering > 1. Journal Articles
Graduate School of Fine Arts > Sculpture > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Altmetrics

Total Views & Downloads

BROWSE