2021
DOI: 10.1155/2021/6678194
|View full text |Cite
|
Sign up to set email alerts
|

Private Predicate Encryption for Inner Product from Key-Homomorphic Pseudorandom Function

Abstract: Predicate encryption (PE), formalized by Katz et al., is a new paradigm of public-key encryption that conceptually captures the public-key encryption that supports fine-grained access control policy. Because of the nature of PE, it is used for cloud storage so that users can retrieve encrypted data without revealing any information about the data to cloud servers and other users. Although lots of PE schemes have been studied, the predicate-hiding security is seldom considered; that is, the user’s secret key ma… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2022
2022
2022
2022

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(2 citation statements)
references
References 27 publications
0
2
0
Order By: Relevance
“…Working Department: IT AND(Job Position : Technician OR Age : Under 30). (20) It can be written as such a polynomial:…”
Section: An Examplementioning
confidence: 99%
See 1 more Smart Citation
“…Working Department: IT AND(Job Position : Technician OR Age : Under 30). (20) It can be written as such a polynomial:…”
Section: An Examplementioning
confidence: 99%
“…Subsequently, there are many applications about the IoT [7][8][9][10][11][12][13][14][15][16][17][18][19]. And some predicate encryption schemes [20,21] and ABE schemes [22,23] have been proposed, but these are based on bilinear groups and cannot resist quantum attacks. Nowadays, there are more and more intelligent applications [24][25][26][27][28][29][30].…”
Section: Introductionmentioning
confidence: 99%