TY - JOUR
T1 - Unbounded inner product functional encryption from bilinear maps
AU - Tomida, Junichi
AU - Takashima, Katsuyuki
N1 - Publisher Copyright:
© 2020, The JJIAM Publishing Committee and Springer Japan KK, part of Springer Nature.
PY - 2020/9/1
Y1 - 2020/9/1
N2 - Inner product functional encryption (IPFE) is one class of functional encryption supporting only inner product functionality. All previous IPFE schemes are bounded schemes, meaning that the vector length that can be handled in the scheme is fixed in the setup phase. In this paper, we propose the first unbounded IPFE schemes, in which we do not have to fix the lengths of vectors in the setup phase and can handle (a priori) unbounded polynomial lengths of vectors. Our first scheme is private-key based and fully function hiding. That is, secret keys hide the information of the associated function. Our second scheme is public-key based and provides adaptive security in the indistinguishability based security definition. Both our schemes are based on SXDH, which is a well-studied standard assumption, and secure in the standard model. Furthermore, our schemes are quite efficient, incurring an efficiency loss by only a small constant factor from previous bounded function hiding schemes.
AB - Inner product functional encryption (IPFE) is one class of functional encryption supporting only inner product functionality. All previous IPFE schemes are bounded schemes, meaning that the vector length that can be handled in the scheme is fixed in the setup phase. In this paper, we propose the first unbounded IPFE schemes, in which we do not have to fix the lengths of vectors in the setup phase and can handle (a priori) unbounded polynomial lengths of vectors. Our first scheme is private-key based and fully function hiding. That is, secret keys hide the information of the associated function. Our second scheme is public-key based and provides adaptive security in the indistinguishability based security definition. Both our schemes are based on SXDH, which is a well-studied standard assumption, and secure in the standard model. Furthermore, our schemes are quite efficient, incurring an efficiency loss by only a small constant factor from previous bounded function hiding schemes.
KW - Bilinear maps
KW - Function hiding
KW - Functional encryption
KW - Inner product
KW - Unbounded
UR - http://www.scopus.com/inward/record.url?scp=85083777949&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85083777949&partnerID=8YFLogxK
U2 - 10.1007/s13160-020-00419-x
DO - 10.1007/s13160-020-00419-x
M3 - Article
AN - SCOPUS:85083777949
SN - 0916-7005
VL - 37
SP - 723
EP - 779
JO - Japan Journal of Industrial and Applied Mathematics
JF - Japan Journal of Industrial and Applied Mathematics
IS - 3
ER -