{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,26]],"date-time":"2026-02-26T01:42:35Z","timestamp":1772070155202,"version":"3.50.1"},"reference-count":51,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2023,6,13]],"date-time":"2023-06-13T00:00:00Z","timestamp":1686614400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2023,6,13]],"date-time":"2023-06-13T00:00:00Z","timestamp":1686614400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/100009572","name":"University of St.Gallen","doi-asserted-by":"crossref","id":[{"id":"10.13039\/100009572","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Cryptol"],"published-print":{"date-parts":[[2023,7]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>Predicate inner product functional encryption (P-IPFE) is essentially attribute-based IPFE (AB-IPFE) which additionally hides attributes associated to ciphertexts. In a P-IPFE, a message <jats:inline-formula><jats:alternatives><jats:tex-math>$${\\textbf {x}}$$<\/jats:tex-math><mml:math xmlns:mml=\"http:\/\/www.w3.org\/1998\/Math\/MathML\">\n                  <mml:mi>x<\/mml:mi>\n                <\/mml:math><\/jats:alternatives><\/jats:inline-formula> is encrypted under an attribute <jats:inline-formula><jats:alternatives><jats:tex-math>$${\\textbf {w}}$$<\/jats:tex-math><mml:math xmlns:mml=\"http:\/\/www.w3.org\/1998\/Math\/MathML\">\n                  <mml:mi>w<\/mml:mi>\n                <\/mml:math><\/jats:alternatives><\/jats:inline-formula> and a secret key is generated for a pair <jats:inline-formula><jats:alternatives><jats:tex-math>$$({\\textbf {y}}, {\\textbf {v}})$$<\/jats:tex-math><mml:math xmlns:mml=\"http:\/\/www.w3.org\/1998\/Math\/MathML\">\n                  <mml:mrow>\n                    <mml:mo>(<\/mml:mo>\n                    <mml:mi>y<\/mml:mi>\n                    <mml:mo>,<\/mml:mo>\n                    <mml:mi>v<\/mml:mi>\n                    <mml:mo>)<\/mml:mo>\n                  <\/mml:mrow>\n                <\/mml:math><\/jats:alternatives><\/jats:inline-formula> such that recovery of <jats:inline-formula><jats:alternatives><jats:tex-math>$$\\langle {{\\textbf {x}}}, {{\\textbf {y}}}\\rangle $$<\/jats:tex-math><mml:math xmlns:mml=\"http:\/\/www.w3.org\/1998\/Math\/MathML\">\n                  <mml:mrow>\n                    <mml:mo>\u27e8<\/mml:mo>\n                    <mml:mi>x<\/mml:mi>\n                    <mml:mo>,<\/mml:mo>\n                    <mml:mi>y<\/mml:mi>\n                    <mml:mo>\u27e9<\/mml:mo>\n                  <\/mml:mrow>\n                <\/mml:math><\/jats:alternatives><\/jats:inline-formula> requires the vectors <jats:inline-formula><jats:alternatives><jats:tex-math>$${\\textbf {w}}, {\\textbf {v}}$$<\/jats:tex-math><mml:math xmlns:mml=\"http:\/\/www.w3.org\/1998\/Math\/MathML\">\n                  <mml:mrow>\n                    <mml:mi>w<\/mml:mi>\n                    <mml:mo>,<\/mml:mo>\n                    <mml:mi>v<\/mml:mi>\n                  <\/mml:mrow>\n                <\/mml:math><\/jats:alternatives><\/jats:inline-formula> to satisfy a linear relation. We call a P-IPFE <jats:italic>unbounded<\/jats:italic> if it can encrypt unbounded length attributes and message vectors. <jats:inline-formula><jats:alternatives><jats:tex-math>$$\\bullet $$<\/jats:tex-math><mml:math xmlns:mml=\"http:\/\/www.w3.org\/1998\/Math\/MathML\">\n                  <mml:mo>\u2219<\/mml:mo>\n                <\/mml:math><\/jats:alternatives><\/jats:inline-formula><jats:italic>zero predicate IPFE<\/jats:italic>. We construct the <jats:italic>first<\/jats:italic> unbounded zero predicate IPFE (UZP-IPFE) which recovers <jats:inline-formula><jats:alternatives><jats:tex-math>$$\\langle {{\\textbf {x}}}, {{\\textbf {y}}}\\rangle $$<\/jats:tex-math><mml:math xmlns:mml=\"http:\/\/www.w3.org\/1998\/Math\/MathML\">\n                  <mml:mrow>\n                    <mml:mo>\u27e8<\/mml:mo>\n                    <mml:mi>x<\/mml:mi>\n                    <mml:mo>,<\/mml:mo>\n                    <mml:mi>y<\/mml:mi>\n                    <mml:mo>\u27e9<\/mml:mo>\n                  <\/mml:mrow>\n                <\/mml:math><\/jats:alternatives><\/jats:inline-formula> if <jats:inline-formula><jats:alternatives><jats:tex-math>$$\\langle {{\\textbf {w}}}, {{\\textbf {v}}}\\rangle =0$$<\/jats:tex-math><mml:math xmlns:mml=\"http:\/\/www.w3.org\/1998\/Math\/MathML\">\n                  <mml:mrow>\n                    <mml:mo>\u27e8<\/mml:mo>\n                    <mml:mi>w<\/mml:mi>\n                    <mml:mo>,<\/mml:mo>\n                    <mml:mi>v<\/mml:mi>\n                    <mml:mo>\u27e9<\/mml:mo>\n                    <mml:mo>=<\/mml:mo>\n                    <mml:mn>0<\/mml:mn>\n                  <\/mml:mrow>\n                <\/mml:math><\/jats:alternatives><\/jats:inline-formula>. This construction is inspired by the unbounded IPFE of Tomida and Takashima (ASIACRYPT 2018) and the unbounded zero inner product encryption of Okamoto and Takashima (ASIACRYPT 2012). The UZP-IPFE stands secure against general attackers capable of decrypting the challenge ciphertext. Concretely, it provides full attribute-hiding security in the indistinguishability-based semi-adaptive model under the standard symmetric external Diffie\u2013Hellman assumption. <jats:inline-formula><jats:alternatives><jats:tex-math>$$\\bullet $$<\/jats:tex-math><mml:math xmlns:mml=\"http:\/\/www.w3.org\/1998\/Math\/MathML\">\n                  <mml:mo>\u2219<\/mml:mo>\n                <\/mml:math><\/jats:alternatives><\/jats:inline-formula><jats:italic>non-zero predicate IPFE<\/jats:italic>. We present the <jats:italic>first<\/jats:italic> unbounded non-zero predicate IPFE (UNP-IPFE) that successfully recovers <jats:inline-formula><jats:alternatives><jats:tex-math>$$\\langle {{\\textbf {x}}}, {{\\textbf {y}}}\\rangle $$<\/jats:tex-math><mml:math xmlns:mml=\"http:\/\/www.w3.org\/1998\/Math\/MathML\">\n                  <mml:mrow>\n                    <mml:mo>\u27e8<\/mml:mo>\n                    <mml:mi>x<\/mml:mi>\n                    <mml:mo>,<\/mml:mo>\n                    <mml:mi>y<\/mml:mi>\n                    <mml:mo>\u27e9<\/mml:mo>\n                  <\/mml:mrow>\n                <\/mml:math><\/jats:alternatives><\/jats:inline-formula> if <jats:inline-formula><jats:alternatives><jats:tex-math>$$\\langle {{\\textbf {w}}}, {{\\textbf {v}}}\\rangle \\ne 0$$<\/jats:tex-math><mml:math xmlns:mml=\"http:\/\/www.w3.org\/1998\/Math\/MathML\">\n                  <mml:mrow>\n                    <mml:mo>\u27e8<\/mml:mo>\n                    <mml:mi>w<\/mml:mi>\n                    <mml:mo>,<\/mml:mo>\n                    <mml:mi>v<\/mml:mi>\n                    <mml:mo>\u27e9<\/mml:mo>\n                    <mml:mo>\u2260<\/mml:mo>\n                    <mml:mn>0<\/mml:mn>\n                  <\/mml:mrow>\n                <\/mml:math><\/jats:alternatives><\/jats:inline-formula>. We generically transform an unbounded quadratic FE (UQFE) scheme to weak attribute-hiding UNP-IPFE in both public and secret key setting. Interestingly, our secret key <jats:italic>simulation<\/jats:italic> secure UNP-IPFE has <jats:italic>succinct<\/jats:italic> secret keys and is constructed from a novel <jats:italic>succinct<\/jats:italic> UQFE that we build in the random oracle model. We leave the problem of constructing a succinct public key UNP-IPFE or UQFE in the standard model as an important open problem.<\/jats:p>","DOI":"10.1007\/s00145-023-09458-2","type":"journal-article","created":{"date-parts":[[2023,6,13]],"date-time":"2023-06-13T21:01:42Z","timestamp":1686690102000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["Unbounded Predicate Inner Product Functional Encryption from Pairings"],"prefix":"10.1007","volume":"36","author":[{"given":"Uddipana","family":"Dowerah","sequence":"first","affiliation":[]},{"given":"Subhranil","family":"Dutta","sequence":"additional","affiliation":[]},{"given":"Aikaterini","family":"Mitrokotsa","sequence":"additional","affiliation":[]},{"given":"Sayantan","family":"Mukherjee","sequence":"additional","affiliation":[]},{"given":"Tapas","family":"Pal","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,6,13]]},"reference":[{"key":"9458_CR1","doi-asserted-by":"crossref","unstructured":"M. Abdalla, F. Benhamouda, M. Kohlweiss, H. Waldner, Decentralizing inner-product functional encryption, in D.\u00a0Lin, K.\u00a0Sako (eds.) Public-Key Cryptography\u2014PKC 2019, Lecture Notes in Computer Science, vol. 11443 (Springer, 2019), pp. 128\u2013157","DOI":"10.1007\/978-3-030-17259-6_5"},{"key":"9458_CR2","doi-asserted-by":"crossref","unstructured":"M. Abdalla, F. Bourse, A.D. Caro, D. Pointcheval, Simple functional encryption schemes for inner products, in J.\u00a0Katz (ed.) Public-Key Cryptography\u2014PKC 2015, Lecture Notes in Computer Science, vol. 9020 (Springer, 2015), pp. 733\u2013751","DOI":"10.1007\/978-3-662-46447-2_33"},{"key":"9458_CR3","unstructured":"M. Abdalla, F. Bourse, A. De\u00a0Caro, D. Pointcheval, Better security for functional encryption for inner product evaluations. Cryptology ePrint Archive (2016). https:\/\/eprint.iacr.org\/2016\/011"},{"key":"9458_CR4","doi-asserted-by":"crossref","unstructured":"M. Abdalla, D. Catalano, D. Fiore, R. Gay, B. Ursu, Multi-input functional encryption for inner products: function-hiding realizations and constructions without pairings, in H.\u00a0Shacham, A.\u00a0Boldyreva (eds.) Advances in Cryptology\u2014CRYPTO 2018, Lecture Notes in Computer Science, vol. 10991 (Springer, 2018), pp. 597\u2013627","DOI":"10.1007\/978-3-319-96884-1_20"},{"key":"9458_CR5","doi-asserted-by":"crossref","unstructured":"M. Abdalla, D. Catalano, R. Gay, B. Ursu, Inner-product functional encryption with fine-grained access control, in S.\u00a0Moriai, H.\u00a0Wang (eds.) Advances in Cryptology\u2014ASIACRYPT 2020, Lecture Notes in Computer Science, vol. 12493 (Springer, 2020), pp. 467\u2013497","DOI":"10.1007\/978-3-030-64840-4_16"},{"key":"9458_CR6","doi-asserted-by":"crossref","unstructured":"M. Abdalla, R. Gay, M. Raykova, H. Wee, Multi-input inner-product functional encryption from pairings, in J.\u00a0Coron, J.\u00a0Nielsen (eds.) Advances in Cryptology\u2014EUROCRYPT 2017, Lecture Notes in Computer Science, vol. 10210 (Springer, 2017), pp. 601\u2013626","DOI":"10.1007\/978-3-319-56620-7_21"},{"key":"9458_CR7","doi-asserted-by":"crossref","unstructured":"M. Abdalla, J. Gong, H. Wee, Functional encryption for attribute-weighted sums from $$k$$-lin, in R.T. Micciancio\u00a0D. (ed.) Advances in Cryptology\u2014CRYPTO 2020, Lecture Notes in Computer Science, vol. 12170 (Springer, 2020), pp. 685\u2013716","DOI":"10.1007\/978-3-030-56784-2_23"},{"key":"9458_CR8","doi-asserted-by":"crossref","unstructured":"S. Agrawal, R. Goyal, J. Tomida, Multi-input quadratic functional encryption from pairings, in T.\u00a0Malkin, C.\u00a0Peikert (eds.) Advances in Cryptology\u2014CRYPTO 2021, Lecture Notes in Computer Science, vol. 12828 (Springer, 2021), pp. 208\u2013238","DOI":"10.1007\/978-3-030-84259-8_8"},{"key":"9458_CR9","doi-asserted-by":"crossref","unstructured":"S. Agrawal, R. Goyal, J. Tomida, Multi-party functional encryption, in K.\u00a0Nissim, B.\u00a0Waters (eds.) Theory of Cryptography Conference\u2014TCC 2021, Lecture Notes in Computer Science, vol. 13043 (Springer, 2021), pp. 224\u2013255","DOI":"10.1007\/978-3-030-90453-1_8"},{"key":"9458_CR10","doi-asserted-by":"crossref","unstructured":"S. Agrawal, B. Libert, D. Stehl\u00e9, Fully secure functional encryption for inner products, from standard assumptions, in M.\u00a0Robshaw, J.\u00a0Katz (eds.) Advances in Cryptology\u2014CRYPTO 2016, Lecture Notes in Computer Science, vol. 9816 (Springer, 2016), pp. 333\u2013362","DOI":"10.1007\/978-3-662-53015-3_12"},{"key":"9458_CR11","doi-asserted-by":"crossref","unstructured":"S. Agrawal, M. Maitra, S. Yamada, Attribute based encryption (and more) for nondeterministic finite automata from LWE, in A.\u00a0Boldyreva, D.\u00a0Micciancio (eds.) Advances in Cryptology\u2014CRYPTO 2019, Lecture Notes in Computer Science, vol. 11693 (Springer, 2019), pp. 765\u2013797","DOI":"10.1007\/978-3-030-26951-7_26"},{"key":"9458_CR12","doi-asserted-by":"crossref","unstructured":"S. Agrawal, A. Pellet-Mary, Indistinguishability obfuscation without maps: attacks and fixes for noisy linear fe, in A.\u00a0Canteaut, Y.\u00a0Ishai (eds.) Advances in Cryptology\u2014EUROCRYPT 2020, Lecture Notes in Computer Science, vol. 12105 (Springer, 2020), pp. 110\u2013140","DOI":"10.1007\/978-3-030-45721-1_5"},{"key":"9458_CR13","doi-asserted-by":"crossref","unstructured":"N. Attrapadung, Unbounded dynamic predicate compositions in attribute-based encryption, in Y.\u00a0Ishai, V.\u00a0Rijmen (eds.) Advances in Cryptology\u2014EUROCRYPT 2019, Lecture Notes in Computer Science, vol. 11476 (Springer, 2019), pp. 34\u201367","DOI":"10.1007\/978-3-030-17653-2_2"},{"key":"9458_CR14","doi-asserted-by":"crossref","unstructured":"C.E.Z. Baltico, D. Catalano, D. Fiore, R. Gay, Practical functional encryption for quadratic functions with applications to predicate encryption, in J.\u00a0Katz, H.\u00a0Shacham (eds.) Advances in Cryptology\u2014CRYPTO 2017, Lecture Notes in Computer Science, vol. 10401 (Springer, 2017), pp. 67\u201398","DOI":"10.1007\/978-3-319-63688-7_3"},{"key":"9458_CR15","doi-asserted-by":"crossref","unstructured":"E. Barker, E. Barker, W. Burr, W. Polk, M. Smid, et\u00a0al., Recommendation for key management: Part 1: General. National Institute of Standards and Technology, Technology Administration... (2006)","DOI":"10.6028\/NIST.SP.800-57p1r2006"},{"key":"9458_CR16","doi-asserted-by":"crossref","unstructured":"P.S. Barreto, M. Naehrig, Pairing-friendly elliptic curves of prime order, in B.\u00a0Preneel, S.\u00a0Tavares (eds.) International Workshop on Selected Areas in Cryptography\u2014SAC 2005, Lecture Notes in Computer Science, vol. 3897 (Springer, 2005), pp. 319\u2013331","DOI":"10.1007\/11693383_22"},{"key":"9458_CR17","doi-asserted-by":"crossref","unstructured":"F. Benhamouda, F. Bourse, H. Lipmaa, CCA-secure inner-product functional encryption from projective hash functions, in S.\u00a0Fehr (ed.) Public-Key Cryptography\u2014PKC 2017, Lecture Notes in Computer Science, vol. 10175 (Springer, 2017), pp. 36\u201366","DOI":"10.1007\/978-3-662-54388-7_2"},{"key":"9458_CR18","doi-asserted-by":"crossref","unstructured":"A. Bishop, A. Jain, L. Kowalczyk, Function-hiding inner product encryption, in T.\u00a0Iwata, J.\u00a0Cheon (eds.) Advances in Cryptology\u2014ASIACRYPT 2015, Lecture Notes in Computer Science, vol. 9452 (Springer, 2015), pp. 470\u2013491","DOI":"10.1007\/978-3-662-48797-6_20"},{"key":"9458_CR19","doi-asserted-by":"crossref","unstructured":"N. Bitansky, V. Vaikuntanathan, Indistinguishability obfuscation from functional encryption. J. ACM (JACM) 65(6), 1\u201337 (2018)","DOI":"10.1145\/3234511"},{"key":"9458_CR20","doi-asserted-by":"crossref","unstructured":"D. Boneh, A. Sahai, B. Waters, Functional encryption: definitions and challenges, in Y.\u00a0Ishai (ed.) Theory of Cryptography Conference\u2014TCC 2011, Lecture Notes in Computer Science, vol. 6597 (Springer, 2011), pp. 253\u2013273","DOI":"10.1007\/978-3-642-19571-6_16"},{"key":"9458_CR21","doi-asserted-by":"crossref","unstructured":"Z. Brakerski, V. Vaikuntanathan, Circuit-ABE from LWE: unbounded attributes and semi-adaptive security, in M.\u00a0Robshaw, J.\u00a0Katz (eds.) Advances in Cryptology\u2014 CRYPTO 2016, Lecture Notes in Computer Science, vol. 9816 (Springer, 2016), pp. 363\u2013384","DOI":"10.1007\/978-3-662-53015-3_13"},{"key":"9458_CR22","doi-asserted-by":"crossref","unstructured":"F. Brezing, A. Weng, Elliptic curves suitable for pairing based cryptography. Des. Codes Cryptogr. 37(1), 133\u2013141 (2005)","DOI":"10.1007\/s10623-004-3808-4"},{"key":"9458_CR23","doi-asserted-by":"crossref","unstructured":"G. Castagnos, F. Laguillaumie, I. Tucker, Practical fully secure unrestricted inner product functional encryption modulo p, in T.\u00a0Peyrin, S.\u00a0Galbraith (eds.) Advances in Cryptology\u2014ASIACRYPT 2018, Lecture Notes in Computer Science, vol. 11273 (Springer, 2018), pp. 733\u2013764","DOI":"10.1007\/978-3-030-03329-3_25"},{"key":"9458_CR24","doi-asserted-by":"crossref","unstructured":"P. Datta, R. Dutta, S. Mukhopadhyay, Functional encryption for inner product with full function privacy, in C.\u00a0Cheng, K.\u00a0Chung, G.\u00a0Persiano, B.\u00a0Yang (eds.) Public-Key Cryptography\u2014PKC 2016, Lecture Notes in Computer Science, vol. 9614 (Springer, 2016), pp. 164\u2013195","DOI":"10.1007\/978-3-662-49384-7_7"},{"key":"9458_CR25","doi-asserted-by":"crossref","unstructured":"P. Datta, T. Okamoto, J. Tomida, Full-hiding (unbounded) multi-input inner product functional encryption from the $$k$$-Linear assumption, in M.\u00a0Abdalla, R.\u00a0Dahab (eds.) Public-Key Cryptography\u2014PKC 2018, Lecture Notes in Computer Science, vol. 10770 (Springer, 2018), pp. 245\u2013277","DOI":"10.1007\/978-3-319-76581-5_9"},{"key":"9458_CR26","doi-asserted-by":"crossref","unstructured":"P. Datta, T. Pal, (Compact) adaptively secure FE for attribute-weighted sums from $$k$$-lin, in Advances in Cryptology\u2014ASIACRYPT 2021, Lecture Notes in Computer Science, vol. 13093 (Springer, 2021), pp. 434\u2013467","DOI":"10.1007\/978-3-030-92068-5_15"},{"key":"9458_CR27","doi-asserted-by":"crossref","unstructured":"E. Dufour-Sans, D. Pointcheval, Unbounded inner-product functional encryption with succinct keys, in R.\u00a0Deng, V.\u00a0Gauthier-Uma\u00f1a, M.\u00a0Ochoa, M.\u00a0Yung (eds.) Applied Cryptography and Network Security\u2014ACNS 2019, Lecture Notes in Computer Science, vol. 11464 (Springer, 2019), pp. 426\u2013441","DOI":"10.1007\/978-3-030-21568-2_21"},{"key":"9458_CR28","doi-asserted-by":"crossref","unstructured":"S. Dutta, T. Pal, R. Dutta, Fully secure unbounded zero inner product encryption with short ciphertexts and keys, in Q.\u00a0Huang, Y.\u00a0Yu (eds.) International Conference on Provable Security, Lecture Notes in Computer Science, vol. 13059 (Springer, 2021), pp. 241\u2013258","DOI":"10.1007\/978-3-030-90402-9_13"},{"key":"9458_CR29","doi-asserted-by":"crossref","unstructured":"A. Escala, G. Herold, E. Kiltz, C. R\u00e0fols, J. Villar, An algebraic framework for diffie\u2013hellman assumptions. J. Cryptol. 30(1), 242\u2013288 (2017)","DOI":"10.1007\/s00145-015-9220-6"},{"key":"9458_CR30","doi-asserted-by":"crossref","unstructured":"D. Freeman, M. Scott, E. Teske, A taxonomy of pairing-friendly elliptic curves. J. Cryptol. 23(2), 224\u2013280 (2010)","DOI":"10.1007\/s00145-009-9048-z"},{"key":"9458_CR31","doi-asserted-by":"crossref","unstructured":"R. Gay, A new paradigm for public-key functional encryption for degree-2 polynomials, in IACR International Conference on Public-Key Cryptography\u2014PKC 2020, Lecture Notes in Computer Science, vol. 12110 (Springer, 2020), pp. 95\u2013120","DOI":"10.1007\/978-3-030-45374-9_4"},{"key":"9458_CR32","doi-asserted-by":"crossref","unstructured":"S. Goldwasser, Y. Kalai, R.A. Popa, V. Vaikuntanathan, N. Zeldovich, Reusable garbled circuits and succinct functional encryption, in Proceedings of the Forty-Fifth Annual ACM Symposium on Theory of Computing (2013), pp. 555\u2013564","DOI":"10.1145\/2488608.2488678"},{"key":"9458_CR33","doi-asserted-by":"crossref","unstructured":"S. Gorbunov, V. Vaikuntanathan, H. Wee, Attribute-based encryption for circuits. J. ACM (JACM) 62(6), 1\u201333 (2015)","DOI":"10.1145\/2824233"},{"key":"9458_CR34","doi-asserted-by":"crossref","unstructured":"V. Goyal, O. Pandey, A. Sahai, B. Waters, Attribute-based encryption for fine-grained access control of encrypted data, in Proceedings of the 13th ACM Conference on Computer and Communications security (2006), pp. 89\u201398","DOI":"10.1145\/1180405.1180418"},{"key":"9458_CR35","doi-asserted-by":"crossref","unstructured":"A. Jain, H. Lin, A. Sahai, Indistinguishability obfuscation from well-founded assumptions, in Proceedings of the 53rd Annual ACM SIGACT Symposium on Theory of Computing (2021), pp. 60\u201373","DOI":"10.1145\/3406325.3451093"},{"key":"9458_CR36","doi-asserted-by":"crossref","unstructured":"S. Katsumata, S. Yamada, Non-zero inner product encryption schemes from various assumptions: LWE, DDH and DCR, in D.\u00a0Lin, K.\u00a0Sako (eds.) Public-Key Cryptography\u2014PKC 2019, Lecture Notes in Computer Science, vol. 11443 (Springer, 2019), pp. 158\u2013188","DOI":"10.1007\/978-3-030-17259-6_6"},{"key":"9458_CR37","doi-asserted-by":"crossref","unstructured":"J. Katz, A. Sahai, B. Waters, Predicate encryption supporting disjunctions, polynomial equations, and inner products, in N.\u00a0Smart (ed.) Advances in Cryptology\u2014EUROCRYPT 2008, Lecture Notes in Computer Science, vol. 4965 (Springer, 2008), pp. 146\u2013162","DOI":"10.1007\/978-3-540-78967-3_9"},{"key":"9458_CR38","doi-asserted-by":"crossref","unstructured":"Q. Lai, F.H. Liu, Z. Wang, New lattice two-stage sampling technique and its applications to functional encryption\u2014stronger security and smaller ciphertexts, in A.\u00a0Canteaut, F.\u00a0Standaert (eds.) Advances in Cryptology\u2014EUROCRYPT 2021, Lecture Notes in Computer Science, vol. 12696 (Springer, 2021), pp. 498\u2013527","DOI":"10.1007\/978-3-030-77870-5_18"},{"key":"9458_CR39","unstructured":"J. Lee, D. Kim, D. Kim, Y. Song, J. Shin, J.H. Cheon, Instant privacy-preserving biometric authentication for hamming distance. Cryptology ePrint Archive, Paper 2018\/1214 (2018). https:\/\/eprint.iacr.org\/2018\/1214"},{"key":"9458_CR40","doi-asserted-by":"crossref","unstructured":"A. Lewko, B. Waters, Unbounded HIBE and attribute-based encryption, in K.\u00a0Paterson (ed.) Advances in Cryptology\u2014EUROCRYPT 2011, Lecture Notes in Computer Science, vol. 6632 (Springer, 2011), pp. 547\u2013567","DOI":"10.1007\/978-3-642-20465-4_30"},{"key":"9458_CR41","doi-asserted-by":"crossref","unstructured":"B. Libert, R. Titiu, Multi-client functional encryption for linear functions in the standard model from LWE, in S.\u00a0Galbraith, S.\u00a0Moriai (eds.) Advances in Cryptology\u2014ASIACRYPT 2019, Lecture Notes in Computer Science, vol. 11923 (Springer, 2019), pp. 520\u2013551","DOI":"10.1007\/978-3-030-34618-8_18"},{"key":"9458_CR42","doi-asserted-by":"crossref","unstructured":"H. Lin, Indistinguishability obfuscation from SXDH on 5-linear maps and locality-5 PRGs, in J.\u00a0Katz, H.\u00a0Shacham (eds.) Advances in Cryptology\u2014CRYPTO 2017, Lecture Notes in Computer Science, vol. 10401 (Springer, 2017), pp. 599\u2013629","DOI":"10.1007\/978-3-319-63688-7_20"},{"key":"9458_CR43","doi-asserted-by":"crossref","unstructured":"T. Okamoto, K. Takashima, Fully secure functional encryption with general relations from the decisional linear assumption, in T.\u00a0Rabin (ed.) Advances in Cryptology\u2014CRYPTO 2010, Lecture Notes in Computer Science, vol. 6223 (Springer, 2010), pp. 191\u2013208","DOI":"10.1007\/978-3-642-14623-7_11"},{"key":"9458_CR44","doi-asserted-by":"crossref","unstructured":"T. Okamoto, K. Takashima, Adaptively attribute-hiding (hierarchical) inner product encryption, in D.\u00a0Pointcheval, T.\u00a0Johansson (eds.) Advances in Cryptology\u2014EUROCRYPT 2012, Lecture Notes in Computer Science, vol. 7237 (Springer, 2012), pp. 591\u2013608","DOI":"10.1007\/978-3-642-29011-4_35"},{"key":"9458_CR45","doi-asserted-by":"crossref","unstructured":"T. Okamoto, K. Takashima, Fully secure unbounded inner-product and attribute-based encryption, in X.\u00a0Wang, K.\u00a0Sako (eds.) Advances in Cryptology\u2014ASIACRYPT 2012, Lecture Notes in Computer Science, vol. 7658 (Springer, 2012), pp. 349\u2013366","DOI":"10.1007\/978-3-642-34961-4_22"},{"key":"9458_CR46","doi-asserted-by":"crossref","unstructured":"T. Okamoto, K. Takashima, Achieving short ciphertexts or short secret-keys for adaptively secure general inner-product encryption. Des. Codes Cryptogr. 77(2), 725\u2013771 (2015)","DOI":"10.1007\/s10623-015-0131-1"},{"key":"9458_CR47","doi-asserted-by":"crossref","unstructured":"T. Pal, R. Dutta, CCA secure attribute-hiding inner product encryption from minimal assumption, in Information Security and Privacy: 26th Australasian Conference, ACISP 2021, Virtual Event, December 1-3, 2021, Proceedings (Springer, Berlin, Heidelberg, 2021), pp. 254\u2013274","DOI":"10.1007\/978-3-030-90567-5_13"},{"key":"9458_CR48","unstructured":"J. Tomida, Unbounded quadratic functional encryption and more from pairings. Cryptology ePrint Archive, Paper 2022\/1124 (2022). https:\/\/eprint.iacr.org\/2022\/1124"},{"key":"9458_CR49","doi-asserted-by":"crossref","unstructured":"J. Tomida, K. Takashima, Unbounded inner product functional encryption from bilinear maps, in T.\u00a0Peyrin, S.\u00a0Galbraith (eds.) Advances in Cryptology\u2014ASIACRYPT 2018, Lecture Notes in Computer Science, vol. 11273 (Springer, 2018), pp. 609\u2013639","DOI":"10.1007\/978-3-030-03329-3_21"},{"key":"9458_CR50","doi-asserted-by":"crossref","unstructured":"B. Waters, Dual system encryption: realizing fully secure IBE and HIBE under simple assumptions, in S.\u00a0Halevi (ed.) Advances in Cryptology\u2014CRYPTO 2009, Lecture Notes in Computer Science, vol. 5677 (Springer, 2009), pp. 619\u2013636","DOI":"10.1007\/978-3-642-03356-8_36"},{"key":"9458_CR51","doi-asserted-by":"crossref","unstructured":"H. Wee, Functional encryption for quadratic functions from $$k$$-lin, revisited, in R.\u00a0Pass, K.\u00a0Pietrzak (eds.) Theory of Cryptography Conference\u2014TCC 2020, Lecture Notes in Computer Science, vol. 12550 (Springer, 2020), pp. 210\u2013228","DOI":"10.1007\/978-3-030-64375-1_8"}],"container-title":["Journal of Cryptology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00145-023-09458-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s00145-023-09458-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00145-023-09458-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,8,9]],"date-time":"2023-08-09T16:11:35Z","timestamp":1691597495000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s00145-023-09458-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,6,13]]},"references-count":51,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2023,7]]}},"alternative-id":["9458"],"URL":"https:\/\/doi.org\/10.1007\/s00145-023-09458-2","relation":{},"ISSN":["0933-2790","1432-1378"],"issn-type":[{"value":"0933-2790","type":"print"},{"value":"1432-1378","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,6,13]]},"assertion":[{"value":"28 September 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 March 2023","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 April 2023","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 June 2023","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}],"article-number":"29"}}