{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,27]],"date-time":"2026-01-27T15:32:39Z","timestamp":1769527959509,"version":"3.49.0"},"publisher-location":"Cham","reference-count":28,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031828515","type":"print"},{"value":"9783031828522","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-82852-2_2","type":"book-chapter","created":{"date-parts":[[2025,3,12]],"date-time":"2025-03-12T13:01:46Z","timestamp":1741784506000},"page":"26-53","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Simulation Secure Multi-input Quadratic Functional Encryption"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-3563-9133","authenticated-orcid":false,"given":"Ferran","family":"Alborch Escobar","sequence":"first","affiliation":[]},{"given":"S\u00e9bastien","family":"Canard","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6464-1139","authenticated-orcid":false,"given":"Fabien","family":"Laguillaumie","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,3,13]]},"reference":[{"key":"2_CR1","doi-asserted-by":"publisher","unstructured":"Abdalla, M., Bourse, F., Caro, A.D., Pointcheval, D.: Simple functional encryption schemes for inner products. In: Katz, J. (ed.) Public-Key Cryptography \u2013 PKC 2015, pp. 733\u2013751. Springer, Berlin, Heidelberg (2015). https:\/\/doi.org\/10.1007\/978-3-662-46447-2_33","DOI":"10.1007\/978-3-662-46447-2_33"},{"key":"2_CR2","doi-asserted-by":"publisher","unstructured":"Abdalla, M., Catalano, D., Fiore, D., Gay, R., Ursu, B.: Multi-input functional encryption for inner products: Function-hiding realizations and constructions without pairings. Cryptology ePrint Archive, Paper 2017\/972 (2017). https:\/\/doi.org\/10.1007\/978-3-319-96884-1_20, https:\/\/eprint.iacr.org\/2017\/972","DOI":"10.1007\/978-3-319-96884-1_20"},{"key":"2_CR3","doi-asserted-by":"publisher","unstructured":"Abdalla, M., Catalano, D., Fiore, D., Gay, R., Ursu, B.: Multi-input functional encryption for inner products: Function-hiding realizations and constructions without pairings. In: Shacham, H., Boldyreva, A. (eds.) Advances in Cryptology \u2013 CRYPTO 2018, pp. 597\u2013627. Springer International Publishing, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-96884-1_20","DOI":"10.1007\/978-3-319-96884-1_20"},{"key":"2_CR4","doi-asserted-by":"publisher","unstructured":"Abdalla, M., Gay, R., Raykova, M., Wee, H.: Multi-input inner-product functional encryption from pairings. In: Coron, J.S., Nielsen, J.B. (eds.) Advances in Cryptology \u2013 EUROCRYPT 2017, pp. 601\u2013626. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-56620-7_21","DOI":"10.1007\/978-3-319-56620-7_21"},{"key":"2_CR5","doi-asserted-by":"publisher","unstructured":"Agrawal, S., Gorbunov, S., Vaikuntanathan, V., Wee, H.: Functional encryption: New perspectives and lower bounds. In: Canetti, R., Garay, J.A. (eds.) Advances in Cryptology \u2013 CRYPTO 2013, pp. 500\u2013518. Springer Berlin Heidelberg, Berlin, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-40084-1_28","DOI":"10.1007\/978-3-642-40084-1_28"},{"key":"2_CR6","doi-asserted-by":"publisher","unstructured":"Agrawal, S., Goyal, R., Tomida, J.: Multi-input quadratic functional encryption from pairings. In: Malkin, T., Peikert, C. (eds.) Advances in Cryptology \u2013 CRYPTO 2021, pp. 208\u2013238. Springer International Publishing, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-84259-8_8","DOI":"10.1007\/978-3-030-84259-8_8"},{"key":"2_CR7","doi-asserted-by":"publisher","unstructured":"Agrawal, S., Goyal, R., Tomida, J.: Multi-input quadratic functional encryption: Stronger security, broader functionality. In: Kiltz, E., Vaikuntanathan, V. (eds.) Theory of Cryptography, pp. 711\u2013740. Springer Nature Switzerland, Cham (2022). https:\/\/doi.org\/10.1007\/978-3-031-22318-1_25","DOI":"10.1007\/978-3-031-22318-1_25"},{"key":"2_CR8","doi-asserted-by":"publisher","unstructured":"Agrawal, S., Libert, B., Stehl\u00e9, D.: Fully secure functional encryption for inner products, from standard assumptions. In: Robshaw, M., Katz, J. (eds.) Advances in Cryptology \u2013 CRYPTO 2016, pp. 333\u2013362. Springer, Berlin, Heidelberg (2016). https:\/\/doi.org\/10.1007\/978-3-662-53015-3_12","DOI":"10.1007\/978-3-662-53015-3_12"},{"key":"2_CR9","doi-asserted-by":"publisher","unstructured":"Alborch\u00a0Escobar, F., Canard, S., Laguillaumie, F., Phan, D.H.: Computational differential privacy for encrypted databases supporting linear queries. In: Proceedings on Privacy Enhancing Technologies 2024(4), 583\u2014-604 (2024). https:\/\/doi.org\/10.56553\/popets-2024-0131","DOI":"10.56553\/popets-2024-0131"},{"key":"2_CR10","doi-asserted-by":"publisher","unstructured":"Ananth, P., Sahai, A.: Projective arithmetic functional encryption and indistinguishability obfuscation from degree-5 multilinear maps. In: Coron, J.S., Nielsen, J.B. (eds.) Advances in Cryptology \u2013 EUROCRYPT 2017, pp. 152\u2013181. Springer International Publishing, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-56620-7_6","DOI":"10.1007\/978-3-319-56620-7_6"},{"key":"2_CR11","doi-asserted-by":"publisher","unstructured":"Baltico, C.E.Z., Catalano, D., Fiore, D., Gay, R.: Practical functional encryption for quadratic functions with applications to predicate encryption. In: Katz, J., Shacham, H. (eds.) Advances in Cryptology \u2013 CRYPTO 2017, pp. 67\u201398. Springer International Publishing, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-63688-7_3","DOI":"10.1007\/978-3-319-63688-7_3"},{"key":"2_CR12","doi-asserted-by":"publisher","unstructured":"Benhamouda, F., Bourse, F., Lipmaa, H.: Cca-secure inner-product functional encryption from projective hash functions. In: Fehr, S. (ed.) Public-Key Cryptography \u2013 PKC 2017, pp. 36\u201366. Springer, Berlin, Heidelberg (2017). https:\/\/doi.org\/10.1007\/978-3-662-54388-7_2","DOI":"10.1007\/978-3-662-54388-7_2"},{"key":"2_CR13","doi-asserted-by":"publisher","unstructured":"Bishop, A., Jain, A., Kowalczyk, L.: Function-hiding inner product encryption. In: Iwata, T., Cheon, J.H. (eds.) Advances in Cryptology \u2013 ASIACRYPT 2015, pp. 470\u2013491. Springer, Berlin, Heidelberg (2015). https:\/\/doi.org\/10.1007\/978-3-662-48797-6_20","DOI":"10.1007\/978-3-662-48797-6_20"},{"key":"2_CR14","doi-asserted-by":"publisher","unstructured":"Boneh, D., Sahai, A., Waters, B.: Functional encryption: Definitions and challenges. In: Ishai, Y. (ed.) Theory of Cryptography, pp. 253\u2013273. Springer, Berlin, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-19571-6_16","DOI":"10.1007\/978-3-642-19571-6_16"},{"key":"2_CR15","doi-asserted-by":"publisher","unstructured":"Castagnos, G., Laguillaumie, F., Tucker, I.: Practical fully secure unrestricted inner product functional encryption modulo p. In: Peyrin, T., Galbraith, S. (eds.) Advances in Cryptology \u2013 ASIACRYPT 2018, pp. 733\u2013764. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-030-03329-3_25","DOI":"10.1007\/978-3-030-03329-3_25"},{"key":"2_CR16","doi-asserted-by":"publisher","unstructured":"Datta, P., Dutta, R., Mukhopadhyay, S.: Functional encryption for inner product with full function privacy. In: Cheng, C.M., Chung, K.M., Persiano, G., Yang, B.Y. (eds.) Public-Key Cryptography\u2013PKC 2016, pp. 164\u2013195. Springer, Berlin, Heidelberg (2016). https:\/\/doi.org\/10.1007\/978-3-662-49384-7_7","DOI":"10.1007\/978-3-662-49384-7_7"},{"key":"2_CR17","doi-asserted-by":"publisher","unstructured":"Gay, R.: A new paradigm for public-key functional encryption for degree-2 polynomials. In: Kiayias, A., Kohlweiss, M., Wallden, P., Zikas, V. (eds.) Public-Key Cryptography \u2013 PKC 2020, pp. 95\u2013120. Springer International Publishing, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-45374-9_4","DOI":"10.1007\/978-3-030-45374-9_4"},{"key":"2_CR18","doi-asserted-by":"publisher","unstructured":"Goldwasser, S., et al.: Multi-input functional encryption. In: Nguyen, P.Q., Oswald, E. (eds.) Advances in Cryptology \u2013 EUROCRYPT 2014, pp. 578\u2013602. Springer Berlin Heidelberg, Berlin, Heidelberg (2014). https:\/\/doi.org\/10.1007\/978-3-642-55220-5_32","DOI":"10.1007\/978-3-642-55220-5_32"},{"issue":"1","key":"2_CR19","doi-asserted-by":"publisher","first-page":"242","DOI":"10.1007\/s00145-015-9220-6","volume":"30","author":"G Herold","year":"2017","unstructured":"Herold, G., Kiltz, E., R\u00e0fols, C., Villar, J.: An algebraic framework for diffie-hellman assumptions. J. Cryptol. 30(1), 242\u2013288 (2017). https:\/\/doi.org\/10.1007\/s00145-015-9220-6","journal-title":"J. Cryptol."},{"key":"2_CR20","doi-asserted-by":"publisher","unstructured":"Kim, S., Lewi, K., Mandal, A., Montgomery, H., Roy, A., Wu, D.J.: Function-hiding inner product encryption is practical. In: Catalano, D., De\u00a0Prisco, R. (eds.) Security and Cryptography for Networks, pp. 544\u2013562. Springer International Publishing, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-98113-0_29","DOI":"10.1007\/978-3-319-98113-0_29"},{"key":"2_CR21","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1016\/j.tcs.2019.03.016","volume":"783","author":"S Kim","year":"2019","unstructured":"Kim, S., Kim, J., Seo, J.H.: A new approach to practical function-private inner product encryption. Theoret. Comput. Sci. 783, 22\u201340 (2019). https:\/\/doi.org\/10.1016\/j.tcs.2019.03.016","journal-title":"Theoret. Comput. Sci."},{"key":"2_CR22","doi-asserted-by":"publisher","unstructured":"Lin, H.: Indistinguishability obfuscation from sxdh on 5-linear maps and locality-5 prgs. In: Katz, J., Shacham, H. (eds.) Advances in Cryptology \u2013 CRYPTO 2017, pp. 599\u2013629. Springer International Publishing, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-63688-7_20","DOI":"10.1007\/978-3-319-63688-7_20"},{"key":"2_CR23","doi-asserted-by":"publisher","unstructured":"Lin, H., Tessaro, S.: Indistinguishability obfuscation from trilinear maps and block-wise local prgs. In: Katz, J., Shacham, H. (eds.) Advances in Cryptology \u2013 CRYPTO 2017, pp. 630\u2013660. Springer International Publishing, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-63688-7_21","DOI":"10.1007\/978-3-319-63688-7_21"},{"key":"2_CR24","unstructured":"O\u2019Neill, A.: Definitional issues in functional encryption. Cryptology ePrint Archive, Paper 2010\/556 (2010). https:\/\/eprint.iacr.org\/2010\/556"},{"key":"2_CR25","doi-asserted-by":"publisher","unstructured":"Shen, E., Shi, E., Waters, B.: Predicate privacy in encryption systems. In: Reingold, O. (ed.) Theory of Cryptography, pp. 457\u2013473. Springer Berlin Heidelberg, Berlin, Heidelberg (2009). https:\/\/doi.org\/10.1007\/978-3-642-00457-5_27","DOI":"10.1007\/978-3-642-00457-5_27"},{"key":"2_CR26","doi-asserted-by":"publisher","unstructured":"Tomida, J., Abe, M., Okamoto, T.: Efficient functional encryption for inner-product values with full-hiding security. In: Bishop, M., Nascimento, A.C.A. (eds.) Information Security, pp. 408\u2013425. Springer International Publishing, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-45871-7_24","DOI":"10.1007\/978-3-319-45871-7_24"},{"key":"2_CR27","doi-asserted-by":"publisher","unstructured":"\u00dcnal, A.: Impossibility results for lattice-based functional encryption schemes. In: Canteaut, A., Ishai, Y. (eds.) Advances in Cryptology \u2013 EUROCRYPT 2020, pp. 169\u2013199. Springer International Publishing, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-45721-1_7","DOI":"10.1007\/978-3-030-45721-1_7"},{"issue":"4","key":"2_CR28","doi-asserted-by":"publisher","DOI":"10.1007\/s11432-017-9224-9","volume":"61","author":"Q Zhao","year":"2018","unstructured":"Zhao, Q., Zeng, Q., Liu, X., Xu, H.: Simulation-based security of function-hiding inner product encryption. SCIENCE CHINA Inf. Sci. 61(4), 048102 (2018)","journal-title":"SCIENCE CHINA Inf. Sci."}],"container-title":["Lecture Notes in Computer Science","Selected Areas in Cryptography \u2013 SAC 2024"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-82852-2_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,12]],"date-time":"2025-03-12T13:01:52Z","timestamp":1741784512000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-82852-2_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9783031828515","9783031828522"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-82852-2_2","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"13 March 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"The authors have no competing interests to declare that\u00a0are relevant to the content of this article.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Disclosure of Interests"}},{"value":"SAC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Selected Areas in Cryptography","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Montreal, QC","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Canada","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 August 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"31 August 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"31","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"sacrypt2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/sacworkshop.org\/SAC24\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}