{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T13:45:54Z","timestamp":1762004754311},"reference-count":32,"publisher":"Springer Science and Business Media LLC","issue":"2-3","license":[{"start":{"date-parts":[[2015,9,7]],"date-time":"2015-09-07T00:00:00Z","timestamp":1441584000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Des. Codes Cryptogr."],"published-print":{"date-parts":[[2015,12]]},"DOI":"10.1007\/s10623-015-0131-1","type":"journal-article","created":{"date-parts":[[2015,9,7]],"date-time":"2015-09-07T13:58:03Z","timestamp":1441634283000},"page":"725-771","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":39,"title":["Achieving short ciphertexts or short secret-keys for adaptively secure general inner-product encryption"],"prefix":"10.1007","volume":"77","author":[{"given":"Tatsuaki","family":"Okamoto","sequence":"first","affiliation":[]},{"given":"Katsuyuki","family":"Takashima","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,9,7]]},"reference":[{"key":"131_CR1","doi-asserted-by":"crossref","unstructured":"Abdalla M., Kiltz E., Neven G.: Generalized key delegation for hierarchical identity-based encryption. In: Biskup J., Lopez J. (eds.) ESORICS 2007. Lecture Notes in Computer Science, vol. 4734, pp. 139\u2013154. Springer, Berlin (2007).","DOI":"10.1007\/978-3-540-74835-9_10"},{"key":"131_CR2","doi-asserted-by":"crossref","unstructured":"Agrawal S., Gorbunov S., Vaikuntanathan V., Wee H.: Functional encryption: new perspectives and lower bounds. In: CRYPTO 2013, pp. 500\u2013518. Springer, Berlin (2013).","DOI":"10.1007\/978-3-642-40084-1_28"},{"key":"131_CR3","unstructured":"Ananth P., Boneh D., Garg S., Sahai A., Zhandry M.: Differing-inputs obfuscation and applications. In: IACR Cryptology ePrint Archive, vol. 2013, p. 689 (2013)."},{"key":"131_CR4","doi-asserted-by":"crossref","unstructured":"Attrapadung N., Libert B.: Functional encryption for inner product: achieving constant-size ciphertexts with adaptive security or support for negation. In: Nguyen P.Q., Pointcheval D. (eds.) PKC 2010. Lecture Notes in Computer Science, vol. 6056, pp. 384\u2013402. Springer, Berlin (2010).","DOI":"10.1007\/978-3-642-13013-7_23"},{"key":"131_CR5","doi-asserted-by":"crossref","unstructured":"Attrapadung N., Libert B., de\u00a0Panafieu E.: Expressive key-policy attribute-based encryption with constant-size ciphertexts. In: Catalano D., Fazio N., Gennaro R., Nicolosi A. (eds.) PKC 2011. Lecture Notes in Computer Science, vol. 6571, pp. 90\u2013108. Springer, Berlin (2011).","DOI":"10.1007\/978-3-642-19379-8_6"},{"key":"131_CR6","doi-asserted-by":"crossref","unstructured":"Bethencourt J., Sahai A., Waters B.: Ciphertext-policy attribute-based encryption. In: IEEE Symposium on Security and Privacy, pp. 321\u2013334. IEEE Computer Society Press, Washington, DC (2007).","DOI":"10.1109\/SP.2007.11"},{"key":"131_CR7","doi-asserted-by":"crossref","unstructured":"Boneh D., Canetti R., Halevi S., Katz J.: Chosen-ciphertext security from identity-based encryption. SIAM J. Comput. 36(5),1301\u20131328 (2007).","DOI":"10.1137\/S009753970544713X"},{"key":"131_CR8","doi-asserted-by":"crossref","unstructured":"Boneh D., Hamburg M.: Generalized identity based and broadcast encryption schemes. In: Pieprzyk J. (ed.) ASIACRYPT 2008. Lecture Notes in Computer Science, vol. 5350, pp. 455\u2013470. Springer, Berlin (2008).","DOI":"10.1007\/978-3-540-89255-7_28"},{"key":"131_CR9","doi-asserted-by":"crossref","unstructured":"Boneh D., Sahai A., Waters B.: Functional encryption: definitions and challenges. In: TCC 2011. Lecture Notes in Computer Science, vol. 6597, pp. 253\u2013273. Springer, Heidelberg (2011).","DOI":"10.1007\/978-3-642-19571-6_16"},{"key":"131_CR10","unstructured":"Boyle E., Chung K.-M., Pass R.: On extractability obfuscation. In: IACR Cryptology ePrint Archive, vol. 2013, p. 650 (2013)."},{"key":"131_CR11","unstructured":"Chen J., Wee H.: Dual system groups and its applications\u2014compact HIBE and more. In: IACR Cryptology ePrint Archive, vol. 2014, p. 265 (2014). (A preliminary version appeared at CRYPTO 2013)"},{"key":"131_CR12","doi-asserted-by":"crossref","unstructured":"Delerabl\u00e9e, C.: Identity-based broadcast encryption with constant size ciphertexts and private keys. In: Kurosawa K. (ed.) ASIACRYPT 2007. Lecture Notes in Computer Science, vol. 4833, pp. 200\u2013215. Springer, Berlin (2007).","DOI":"10.1007\/978-3-540-76900-2_12"},{"key":"131_CR13","doi-asserted-by":"crossref","unstructured":"Garg S., Gentry C., Halevi S., Sahai A., Waters, B.: Attribute-based encryption for circuits from multilinear maps. In: CRYPTO 2013, Part II. Lecture Notes in Computer Science, vol. 8043, pp. 479\u2013499. Springer, Heidelberg (2013).","DOI":"10.1007\/978-3-642-40084-1_27"},{"key":"131_CR14","unstructured":"Garg S., Gentry C., Halevi S., Zhandry M.: Fully secure attribute based encryption from multilinear maps. In: IACR Cryptology ePrint Archive, vol. 2014, p. 622 (2014)."},{"key":"131_CR15","doi-asserted-by":"crossref","unstructured":"Gentry C., Silverberg A.: Hierarchical id-based cryptography. In: Zheng Y. (ed.) ASIACRYPT 2002. Lecture Notes in Computer Science, vol. 2501, pp. 548\u2013566. Springer, Heidelberg (2002).","DOI":"10.1007\/3-540-36178-2_34"},{"key":"131_CR16","doi-asserted-by":"crossref","unstructured":"Gentry C., Waters B.: Adaptive security in broadcast encryption systems (with short ciphertexts). In: Joux A. (ed.) EUROCRYPT 2009. Lecture Notes in Computer Science, vol. 5479, pp. 171\u2013188. Springer, Heidelberg (2009).","DOI":"10.1007\/978-3-642-01001-9_10"},{"key":"131_CR17","doi-asserted-by":"crossref","unstructured":"Gorbunov S., Vaikuntanathan V., Wee H.: Attribute-based encryption for circuits. In: IACR Cryptology ePrint Archive, vol. 2013, p. 337 (2013).","DOI":"10.1145\/2488608.2488677"},{"key":"131_CR18","doi-asserted-by":"crossref","unstructured":"Goyal V., Pandey O., Sahai A., Waters B.: Attribute-based encryption for fine-grained access control of encrypted data. In: Juels A., Wright R.N., di\u00a0Vimercati D.C.S. (eds.) ACM Conference on Computer and Communications Security, pp. 89\u201398. ACM, New York (2006).","DOI":"10.1145\/1180405.1180418"},{"key":"131_CR19","doi-asserted-by":"crossref","unstructured":"Katz J., Sahai A., Waters B.: Predicate encryption supporting disjunctions, polynomial equations, and inner products. In: Smart N.P. (ed.) EUROCRYPT 2008. Lecture Notes in Computer Science, vol. 4965, pp. 146\u2013162. Springer, Heidelberg (2008).","DOI":"10.1007\/978-3-540-78967-3_9"},{"key":"131_CR20","doi-asserted-by":"crossref","unstructured":"Lewko A.B., Okamoto T., Sahai A., Takashima K., Waters B.: Fully secure functional encryption: attribute-based encryption and (hierarchical) inner product encryption. In: Gilbert H. (ed.) EUROCRYPT 2010. Lecture Notes in Computer Science, vol. 6110, pp. 62\u201391. Springer, Heidelberg (2010). http:\/\/eprint.iacr.org\/2010\/110 .","DOI":"10.1007\/978-3-642-13190-5_4"},{"key":"131_CR21","doi-asserted-by":"crossref","unstructured":"Lewko A.B., Sahai A., Waters B.: Revocation systems with very small private keys. In: IEEE Symposium on Security and Privacy, pp. 273\u2013285. IEEE Computer Society Press, Washington, DC (2010).","DOI":"10.1109\/SP.2010.23"},{"key":"131_CR22","doi-asserted-by":"crossref","unstructured":"Lewko A.B., Waters B.: New techniques for dual system encryption and fully secure HIBE with short ciphertexts. In: Micciancio D. (ed.) TCC 2010. Lecture Notes in Computer Science, vol. 5978, pp. 455\u2013479. Springer, Heidelberg (2010).","DOI":"10.1007\/978-3-642-11799-2_27"},{"key":"131_CR23","doi-asserted-by":"crossref","unstructured":"Okamoto T., Takashima K.: Homomorphic encryption and signatures from vector decomposition. In: Galbraith S.D., Paterson K.G. (eds.) Pairing 2008. Lecture Notes in Computer Science, vol. 5209, pp. 57\u201374. Springer, Heidelberg (2008).","DOI":"10.1007\/978-3-540-85538-5_4"},{"key":"131_CR24","doi-asserted-by":"crossref","unstructured":"Okamoto T., Takashima K.: Hierarchical predicate encryption for inner-products. In: Matsui M. (ed.) ASIACRYPT 2009. Lecture Notes in Computer Science, vol. 5912, pp. 214\u2013231. Springer, Heidelberg (2009).","DOI":"10.1007\/978-3-642-10366-7_13"},{"key":"131_CR25","doi-asserted-by":"crossref","unstructured":"Okamoto T., Takashima K.: Fully secure functional encryption with general relations from the decisional linear assumption. In: Rabin T. (ed.) CRYPTO 2010. Lecture Notes in Computer Science, vol. 6223, pp. 191\u2013208. Springer, Heidelberg (2010). http:\/\/eprint.iacr.org\/2010\/563 .","DOI":"10.1007\/978-3-642-14623-7_11"},{"key":"131_CR26","doi-asserted-by":"crossref","unstructured":"Okamoto T., Takashima K.: Achieving short ciphertexts or short secret-keys for adaptively secure general inner-product encryption. In: Lin D., Tsudik G., Wang X. (eds.) CANS 2011. Lecture Notes in Computer Science, vol. 7092, pp. 138\u2013159. Springer, Heidelberg (2011).","DOI":"10.1007\/978-3-642-25513-7_11"},{"key":"131_CR27","doi-asserted-by":"crossref","unstructured":"Okamoto T., Takashima K.: Adaptively attribute-hiding (hierarchical) inner product encryption. In: Pointcheval D., Johansson T. (eds.) EUROCRYPT 2012. Lecture Notes in Computer Science, vol. 7237, pp. 591\u2013608. Springer, Heidelberg (2012). http:\/\/eprint.iacr.org\/2011\/543 .","DOI":"10.1007\/978-3-642-29011-4_35"},{"key":"131_CR28","unstructured":"O\u2019Neill A.: Definitional issues in functional encryption. In: IACR Cryptology ePrint Archive vol. 2010, p. 556 (2010)."},{"key":"131_CR29","doi-asserted-by":"crossref","unstructured":"Sahai A., Waters B.: Fuzzy identity-based encryption. In: Cramer R. (ed.) EUROCRYPT 2005. Lecture Notes in Computer Science, vol. 3494, pp. 457\u2013473. Springer, Heidelberg (2005).","DOI":"10.1007\/11426639_27"},{"key":"131_CR30","unstructured":"Sakai R., Furukawa J.: Identity-based broadcast encryption. In: IACR Cryptology ePrint Archive, vol. 2007, p. 217 (2007)."},{"key":"131_CR31","doi-asserted-by":"crossref","unstructured":"Waters B.: Dual system encryption: realizing fully secure IBE and HIBE under simple assumptions. In: Halevi S. (ed.) CRYPTO 2009. Lecture Notes in Computer Science, vol. 5677, pp. 619\u2013636. Springer, Heidelberg (2009).","DOI":"10.1007\/978-3-642-03356-8_36"},{"key":"131_CR32","unstructured":"Waters B.: A punctured programming approach to adaptively secure functional encryption. In: IACR Cryptology ePrint Archive, vol. 2014, p. 588 (2014)."}],"container-title":["Designs, Codes and Cryptography"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-015-0131-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10623-015-0131-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-015-0131-1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,3,26]],"date-time":"2019-03-26T19:05:28Z","timestamp":1553627128000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10623-015-0131-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,9,7]]},"references-count":32,"journal-issue":{"issue":"2-3","published-print":{"date-parts":[[2015,12]]}},"alternative-id":["131"],"URL":"https:\/\/doi.org\/10.1007\/s10623-015-0131-1","relation":{},"ISSN":["0925-1022","1573-7586"],"issn-type":[{"value":"0925-1022","type":"print"},{"value":"1573-7586","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,9,7]]}}}