2016
DOI: 10.1007/978-3-319-39555-5_13
|View full text |Cite
|
Sign up to set email alerts
|

More Efficient Constructions for Inner-Product Encryption

Abstract: International audienceWe propose new constructions for inner product encryption – IPE1 and IPE2, both secure under the eXternal Diffie-Hellman assumption (SXDH) in asymmetric pairing groups. The first scheme has constant-size ciphertexts whereas the second one is weakly attribute hiding. IPE2 is derived from the identity-based encryption scheme of Jutla Roy (Asiacrypt 2013), that was extended from tag-based quasi-adaptive non-interactive zero-knowledge (QA-NIZK) proofs for linear subspaces of vector spaces ove… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
10
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 16 publications
(10 citation statements)
references
References 28 publications
0
10
0
Order By: Relevance
“…Herein, we compare the efficiency of the proposed IPE scheme with the schemes proposed in [1,3,[5][6][7]15,16,[22][23][24][25][26][27][28][29][30]36] (Because [4,17] are the complete versions of [16,24], we only compare our work with [16,24]). As shown in Table 1, we compare our scheme to others in two aspects: the size of the private key and the number of pairing operations for decryption.…”
Section: Efficiency Analysis and Implementation Resultsmentioning
confidence: 99%
See 4 more Smart Citations
“…Herein, we compare the efficiency of the proposed IPE scheme with the schemes proposed in [1,3,[5][6][7]15,16,[22][23][24][25][26][27][28][29][30]36] (Because [4,17] are the complete versions of [16,24], we only compare our work with [16,24]). As shown in Table 1, we compare our scheme to others in two aspects: the size of the private key and the number of pairing operations for decryption.…”
Section: Efficiency Analysis and Implementation Resultsmentioning
confidence: 99%
“…Huang et al [30] proposed the first enabled-disabled IPE, which supports timed-release services and data self-destruction. Ramanna [15] constructed two IPE schemes using tag-based quasi-adaptive noninteractive zero knowledge, where the first and second both have the property of constant-size ciphertext but only the second has the property of attribute-hiding. Zhang et al [7] recently proposed a new IPE scheme based on a double encryption system; it has been demonstrated to achieve adaptive security under a weak attribute-hiding model.…”
Section: Pairing-based Ipe Schemesmentioning
confidence: 99%
See 3 more Smart Citations