Repository logo
  • English
  • Català
  • Čeština
  • Deutsch
  • Español
  • Français
  • Gàidhlig
  • Italiano
  • Latviešu
  • Magyar
  • Nederlands
  • Polski
  • Português
  • Português do Brasil
  • Suomi
  • Svenska
  • Türkçe
  • Қазақ
  • বাংলা
  • हिंदी
  • Ελληνικά
  • Yкраї́нська
  • Log In
    or
    New user? Click here to register.Have you forgotten your password?
Repository logo
  • Communities & Collections
  • Research Outputs
  • Fundings & Projects
  • People
  • Statistics
  • English
  • Català
  • Čeština
  • Deutsch
  • Español
  • Français
  • Gàidhlig
  • Italiano
  • Latviešu
  • Magyar
  • Nederlands
  • Polski
  • Português
  • Português do Brasil
  • Suomi
  • Svenska
  • Türkçe
  • Қазақ
  • বাংলা
  • हिंदी
  • Ελληνικά
  • Yкраї́нська
  • Log In
    or
    New user? Click here to register.Have you forgotten your password?
  1. Home
  2. Indian Institute of Technology Madras
  3. Publication4
  4. Adaptive Simulation Security for Inner Product Functional Encryption
 
  • Details
Options

Adaptive Simulation Security for Inner Product Functional Encryption

Date Issued
01-01-2020
Author(s)
Agrawal, Shweta 
Indian Institute of Technology, Madras
Libert, Benoît
Maitra, Monosij
Titiu, Radu
DOI
10.1007/978-3-030-45374-9_2
Abstract
Inner product functional encryption [1] is a popular primitive which enables inner product computations on encrypted data. In, the ciphertext is associated with a vector, the secret key is associated with a vector and decryption reveals the inner product. Previously, it was known how to achieve adaptive indistinguishability based security for from the assumptions [8]. However, in the stronger simulation based security game, it was only known how to support a restricted adversary that makes all its key requests either before or after seeing the challenge ciphertext, but not both. In more detail, Wee [46] showed that the-based scheme of Agrawal et al. (Crypto 2016) achieves semi-adaptive simulation-based security, where the adversary must make all its key requests after seeing the challenge ciphertext. On the other hand, O’Neill showed that all-secure schemes (which may be based on satisfy based security in the restricted model where the adversary makes all its key requests before seeing the challenge ciphertext. In this work, we resolve the question of-based security for by showing that variants of the constructions by Agrawal et al., based on, Paillier and, satisfy the strongest possible adaptive-based security where the adversary can make an unbounded number of key requests both before and after seeing the (single) challenge ciphertext. This establishes optimal security of the schemes, under all hardness assumptions on which it can (presently) be based.
Volume
12110 LNCS
Subjects
  • Functional encryption...

  • Inner-products

  • Simulation-based secu...

  • Standard assumptions

Indian Institute of Technology Madras Knowledge Repository developed and maintained by the Library

Built with DSpace-CRIS software - Extension maintained and optimized by 4Science

  • Cookie settings
  • Privacy policy
  • End User Agreement
  • Send Feedback