2020
DOI: 10.3390/app10238669
|View full text |Cite
|
Sign up to set email alerts
|

Practical Inner Product Encryption with Constant Private Key

Abstract: Inner product encryption, first introduced by Katz et al., is a type of predicate encryption in which a ciphertext and a private key correspond to an attribute vector and a predicate vector, respectively. Only if the attribute and predicate vectors satisfy the inner product predicate will the decryption in this scheme be correct. In addition, the ability to use inner product encryption as an underlying building block to construct other useful cryptographic primitives has been demonstrated in the context of ano… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
8
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
1

Relationship

1
4

Authors

Journals

citations
Cited by 5 publications
(8 citation statements)
references
References 37 publications
(98 reference statements)
0
8
0
Order By: Relevance
“…In addition, we only need times exponentiation computations plus two pairing computations in decryption. Though our efficiency is not the best among [3,5,8,11], our scheme achieves decentralization while others do not. In [25], they need n times exponentiation computations plus O(k) pairing computations, where k ≤ 2.…”
Section: Asymptotic Comparisonsmentioning
confidence: 77%
See 3 more Smart Citations
“…In addition, we only need times exponentiation computations plus two pairing computations in decryption. Though our efficiency is not the best among [3,5,8,11], our scheme achieves decentralization while others do not. In [25], they need n times exponentiation computations plus O(k) pairing computations, where k ≤ 2.…”
Section: Asymptotic Comparisonsmentioning
confidence: 77%
“…In this section, we compare our scheme with [3,5,8,11,25] in time complexity, space complexity and other security features. Among these works, [3,5,8,11] are IPE schemes and [25] is a DIPE scheme.…”
Section: Comparisonmentioning
confidence: 99%
See 2 more Smart Citations
“…The second paper provides another review of efficient inner product encryption approach by Tseng et al (2020) [2]. The formal security proof and implementation result are also demonstrated.…”
Section: Published Papersmentioning
confidence: 94%