{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,27]],"date-time":"2026-01-27T03:26:53Z","timestamp":1769484413407,"version":"3.49.0"},"reference-count":52,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2025,12,9]],"date-time":"2025-12-09T00:00:00Z","timestamp":1765238400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,12,9]],"date-time":"2025-12-09T00:00:00Z","timestamp":1765238400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100001665","name":"Agence Nationale de la Recherche","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100001665","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Des. Codes Cryptogr."],"published-print":{"date-parts":[[2026,1]]},"DOI":"10.1007\/s10623-025-01754-1","type":"journal-article","created":{"date-parts":[[2025,12,9]],"date-time":"2025-12-09T05:30:15Z","timestamp":1765258215000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Simulation secure multi-input quadratic functional encryption: applications to differential privacy"],"prefix":"10.1007","volume":"94","author":[{"given":"Ferran","family":"Alborch\u00a0Escobar","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"S\u00e9bastien","family":"Canard","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Fabien","family":"Laguillaumie","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2025,12,9]]},"reference":[{"key":"1754_CR1","doi-asserted-by":"publisher","first-page":"253","DOI":"10.1007\/978-3-642-19571-6_16","volume-title":"Theory of Cryptography","author":"D Boneh","year":"2011","unstructured":"Boneh D., Sahai A., Waters B.: Functional encryption: definitions and challenges. In: Ishai Y. (ed.) Theory of Cryptography, pp. 253\u2013273. Springer, Berlin, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-19571-6_16."},{"key":"1754_CR2","unstructured":"O\u2019Neill, A.: Definitional issues in functional encryption. Cryptology ePrint Archive, Paper 2010\/556. https:\/\/eprint.iacr.org\/2010\/556 (2010)"},{"key":"1754_CR3","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1007\/3-540-39568-7_5","volume-title":"Advances in Cryptology","author":"A Shamir","year":"1985","unstructured":"Shamir A.: Identity-based cryptosystems and signature schemes. In: Blakley G.R., Chaum D. (eds.) Advances in Cryptology, pp. 47\u201353. Springer, Berlin, Heidelberg (1985). https:\/\/doi.org\/10.1007\/3-540-39568-7_5."},{"key":"1754_CR4","doi-asserted-by":"publisher","first-page":"457","DOI":"10.1007\/11426639_27","volume-title":"Advances in Cryptology - EUROCRYPT 2005","author":"A Sahai","year":"2005","unstructured":"Sahai A., Waters B.: Fuzzy identity-based encryption. In: Cramer R. (ed.) Advances in Cryptology - EUROCRYPT 2005, pp. 457\u2013473. Springer, Berlin, Heidelberg (2005). https:\/\/doi.org\/10.1007\/11426639_27."},{"key":"1754_CR5","doi-asserted-by":"publisher","first-page":"325","DOI":"10.1007\/978-3-662-46497-7_13","volume-title":"Theory of Cryptography","author":"V Goyal","year":"2015","unstructured":"Goyal V., Jain A., Koppula V., Sahai A.: Functional encryption for randomized functionalities. In: Dodis Y., Nielsen J.B. (eds.) Theory of Cryptography, pp. 325\u2013351. Springer, Berlin, Heidelberg (2015). https:\/\/doi.org\/10.1007\/978-3-662-46497-7_13."},{"issue":"4","key":"1754_CR6","doi-asserted-by":"publisher","first-page":"583","DOI":"10.56553\/popets-2024-0131","volume":"2024","author":"FA Escobar","year":"2024","unstructured":"Escobar F.A., Canard S., Laguillaumie F., Phan D.H.: Computational differential privacy for encrypted databases supporting linear queries. Proc. Privacy Enhanc. Technol. 2024(4), 583\u2013604 (2024). https:\/\/doi.org\/10.56553\/popets-2024-0131.","journal-title":"Proc. Privacy Enhanc. Technol."},{"issue":"2","key":"1754_CR7","doi-asserted-by":"publisher","first-page":"509","DOI":"10.56553\/popets-2024-0061","volume":"2024","author":"J Zalonis","year":"2024","unstructured":"Zalonis J., Armknecht F., Scheu-Hachtel L.: Differentially private functional encryption. Proc. Privacy Enhanc. Technol. 2024(2), 509\u2013530 (2024). https:\/\/doi.org\/10.56553\/popets-2024-0061.","journal-title":"Proc. Privacy Enhanc. Technol."},{"key":"1754_CR8","doi-asserted-by":"publisher","first-page":"733","DOI":"10.1007\/978-3-662-46447-2_33","volume-title":"Public-Key Cryptography - PKC 2015","author":"M Abdalla","year":"2015","unstructured":"Abdalla M., Bourse F., Caro A.D., Pointcheval D.: Simple functional encryption schemes for inner products. In: Katz J. (ed.) Public-Key Cryptography - PKC 2015, pp. 733\u2013751. Springer, Berlin, Heidelberg (2015). https:\/\/doi.org\/10.1007\/978-3-662-46447-2_33."},{"key":"1754_CR9","doi-asserted-by":"publisher","first-page":"333","DOI":"10.1007\/978-3-662-53015-3_12","volume-title":"Advances in Cryptology - CRYPTO 2016","author":"S Agrawal","year":"2016","unstructured":"Agrawal S., Libert B., Stehl\u00e9 D.: Fully secure functional encryption for inner products, from standard assumptions. In: Robshaw M., Katz J. (eds.) Advances in Cryptology - CRYPTO 2016, pp. 333\u2013362. Springer, Berlin, Heidelberg (2016). https:\/\/doi.org\/10.1007\/978-3-662-53015-3_12."},{"key":"1754_CR10","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1007\/978-3-662-54388-7_2","volume-title":"Public-Key Cryptography - PKC 2017","author":"F Benhamouda","year":"2017","unstructured":"Benhamouda F., Bourse F., Lipmaa H.: CCA-secure inner-product functional encryption from projective hash functions. In: Fehr S. (ed.) Public-Key Cryptography - PKC 2017, pp. 36\u201366. Springer, Berlin, Heidelberg (2017). https:\/\/doi.org\/10.1007\/978-3-662-54388-7_2."},{"key":"1754_CR11","doi-asserted-by":"publisher","first-page":"733","DOI":"10.1007\/978-3-030-03329-3_25","volume-title":"Advances in Cryptology - ASIACRYPT 2018","author":"G Castagnos","year":"2018","unstructured":"Castagnos G., Laguillaumie F., Tucker I.: Practical fully secure unrestricted inner product functional encryption modulo p. In: Peyrin T., Galbraith S. (eds.) Advances in Cryptology - ASIACRYPT 2018, pp. 733\u2013764. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-030-03329-3_25."},{"key":"1754_CR12","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1007\/978-3-319-63688-7_3","volume-title":"Advances in Cryptology - CRYPTO 2017","author":"CEZ Baltico","year":"2017","unstructured":"Baltico C.E.Z., Catalano D., Fiore D., Gay R.: Practical functional encryption for quadratic functions with applications to predicate encryption. In: Katz J., Shacham H. (eds.) Advances in Cryptology - CRYPTO 2017, pp. 67\u201398. Springer International Publishing, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-63688-7_3."},{"key":"1754_CR13","doi-asserted-by":"publisher","first-page":"152","DOI":"10.1007\/978-3-319-56620-7_6","volume-title":"Advances in Cryptology - EUROCRYPT 2017","author":"P Ananth","year":"2017","unstructured":"Ananth P., Sahai A.: Projective arithmetic functional encryption and indistinguishability obfuscation from degree-5 multilinear maps. In: Coron J.S., Nielsen J.B. (eds.) Advances in Cryptology - EUROCRYPT 2017, pp. 152\u2013181. Springer International Publishing, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-56620-7_6."},{"key":"1754_CR14","doi-asserted-by":"publisher","first-page":"599","DOI":"10.1007\/978-3-319-63688-7_20","volume-title":"Advances in Cryptology - CRYPTO 2017","author":"H Lin","year":"2017","unstructured":"Lin H.: Indistinguishability obfuscation from SXDH on 5-linear maps and locality-5 PRGs. In: Katz J., Shacham H. (eds.) Advances in Cryptology - CRYPTO 2017, pp. 599\u2013629. Springer International Publishing, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-63688-7_20."},{"key":"1754_CR15","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1007\/978-3-030-45374-9_4","volume-title":"Public-Key Cryptography - PKC 2020","author":"R Gay","year":"2020","unstructured":"Gay R.: A new paradigm for public-key functional encryption for degree-2 polynomials. In: Kiayias A., Kohlweiss M., Wallden P., Zikas V. (eds.) Public-Key Cryptography - PKC 2020, pp. 95\u2013120. Springer International Publishing, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-45374-9_4."},{"key":"1754_CR16","doi-asserted-by":"publisher","first-page":"630","DOI":"10.1007\/978-3-319-63688-7_21","volume-title":"Advances in Cryptology - CRYPTO 2017","author":"H Lin","year":"2017","unstructured":"Lin H., Tessaro S.: Indistinguishability obfuscation from trilinear maps and block-wise local PRGs. In: Katz J., Shacham H. (eds.) Advances in Cryptology - CRYPTO 2017, pp. 630\u2013660. Springer International Publishing, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-63688-7_21."},{"key":"1754_CR17","doi-asserted-by":"publisher","first-page":"500","DOI":"10.1007\/978-3-642-40084-1_28","volume-title":"Advances in Cryptology - CRYPTO 2013","author":"S Agrawal","year":"2013","unstructured":"Agrawal S., Gorbunov S., Vaikuntanathan V., Wee H.: Functional encryption: new perspectives and lower bounds. In: Canetti R., Garay J.A. (eds.) Advances in Cryptology - CRYPTO 2013, pp. 500\u2013518. Springer, Berlin Heidelberg, Berlin, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-40084-1_28."},{"key":"1754_CR18","doi-asserted-by":"publisher","first-page":"578","DOI":"10.1007\/978-3-642-55220-5_32","volume-title":"Advances in Cryptology - EUROCRYPT 2014","author":"S Goldwasser","year":"2014","unstructured":"Goldwasser S., Gordon S.D., Goyal V., Jain A., Katz J., Liu F.H., Sahai A., Shi E., Zhou H.S.: Multi-input functional encryption. In: Nguyen P.Q., Oswald E. (eds.) Advances in Cryptology - EUROCRYPT 2014, pp. 578\u2013602. Springer, Berlin Heidelberg, Berlin, Heidelberg (2014). https:\/\/doi.org\/10.1007\/978-3-642-55220-5_32."},{"key":"1754_CR19","doi-asserted-by":"publisher","first-page":"601","DOI":"10.1007\/978-3-319-56620-7_21","volume-title":"Advances in Cryptology - EUROCRYPT 2017","author":"M Abdalla","year":"2017","unstructured":"Abdalla M., Gay R., Raykova M., Wee H.: Multi-input inner-product functional encryption from pairings. In: Coron J.S., Nielsen J.B. (eds.) Advances in Cryptology - EUROCRYPT 2017, pp. 601\u2013626. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-56620-7_21."},{"key":"1754_CR20","doi-asserted-by":"publisher","first-page":"597","DOI":"10.1007\/978-3-319-96884-1_20","volume-title":"Advances in Cryptology - CRYPTO 2018","author":"M Abdalla","year":"2018","unstructured":"Abdalla M., Catalano D., Fiore D., Gay R., Ursu B.: Multi-input functional encryption for inner products: function-hiding realizations and constructions without pairings. In: Shacham H., Boldyreva A. (eds.) Advances in Cryptology - CRYPTO 2018, pp. 597\u2013627. Springer International Publishing, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-96884-1_20."},{"key":"1754_CR21","doi-asserted-by":"publisher","first-page":"208","DOI":"10.1007\/978-3-030-84259-8_8","volume-title":"Advances in Cryptology - CRYPTO 2021","author":"S Agrawal","year":"2021","unstructured":"Agrawal S., Goyal R., Tomida J.: Multi-input quadratic functional encryption from pairings. In: Malkin T., Peikert C. (eds.) Advances in Cryptology - CRYPTO 2021, pp. 208\u2013238. Springer International Publishing, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-84259-8_8."},{"key":"1754_CR22","doi-asserted-by":"publisher","first-page":"711","DOI":"10.1007\/978-3-031-22318-1_25","volume-title":"Theory of Cryptography","author":"S Agrawal","year":"2022","unstructured":"Agrawal S., Goyal R., Tomida J.: Multi-input quadratic functional encryption: stronger security, broader functionality. In: Kiltz E., Vaikuntanathan V. (eds.) Theory of Cryptography, pp. 711\u2013740. Cham, Springer Nature Switzerland (2022). https:\/\/doi.org\/10.1007\/978-3-031-22318-1_25."},{"key":"1754_CR23","doi-asserted-by":"publisher","first-page":"457","DOI":"10.1007\/978-3-642-00457-5_27","volume-title":"Theory of Cryptography","author":"E Shen","year":"2009","unstructured":"Shen E., Shi E., Waters B.: Predicate privacy in encryption systems. In: Reingold O. (ed.) Theory of Cryptography, pp. 457\u2013473. Springer, Berlin Heidelberg, Berlin, Heidelberg (2009). https:\/\/doi.org\/10.1007\/978-3-642-00457-5_27."},{"key":"1754_CR24","doi-asserted-by":"publisher","first-page":"470","DOI":"10.1007\/978-3-662-48797-6_20","volume-title":"Advances in Cryptology - ASIACRYPT 2015","author":"A Bishop","year":"2015","unstructured":"Bishop A., Jain A., Kowalczyk L.: Function-hiding inner product encryption. In: Iwata T., Cheon J.H. (eds.) Advances in Cryptology - ASIACRYPT 2015, pp. 470\u2013491. Springer, Berlin, Heidelberg (2015). https:\/\/doi.org\/10.1007\/978-3-662-48797-6_20."},{"key":"1754_CR25","doi-asserted-by":"publisher","first-page":"164","DOI":"10.1007\/978-3-662-49384-7_7","volume-title":"Public-Key Cryptography-PKC 2016","author":"P Datta","year":"2016","unstructured":"Datta P., Dutta R., Mukhopadhyay S.: Functional encryption for inner product with full function privacy. In: Cheng C.M., Chung K.M., Persiano G., Yang B.Y. (eds.) Public-Key Cryptography-PKC 2016, pp. 164\u2013195. Springer, Berlin, Heidelberg (2016). https:\/\/doi.org\/10.1007\/978-3-662-49384-7_7."},{"key":"1754_CR26","doi-asserted-by":"publisher","first-page":"408","DOI":"10.1007\/978-3-319-45871-7_24","volume-title":"Information Security","author":"J Tomida","year":"2016","unstructured":"Tomida J., Abe M., Okamoto T.: Efficient functional encryption for inner-product values with full-hiding security. In: Bishop M., Nascimento A.C.A. (eds.) Information Security, pp. 408\u2013425. Springer International Publishing, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-45871-7_24."},{"key":"1754_CR27","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1016\/j.tcs.2019.03.016","volume":"783","author":"S Kim","year":"2019","unstructured":"Kim S., Kim J., Seo J.H.: A new approach to practical function-private inner product encryption. Theor. Comput. Sci. 783, 22\u201340 (2019). https:\/\/doi.org\/10.1016\/j.tcs.2019.03.016.","journal-title":"Theor. Comput. Sci."},{"key":"1754_CR28","doi-asserted-by":"publisher","first-page":"169","DOI":"10.1007\/978-3-030-45721-1_7","volume-title":"Advances in Cryptology - EUROCRYPT 2020","author":"A \u00dcnal","year":"2020","unstructured":"\u00dcnal A.: Impossibility results for lattice-based functional encryption schemes. In: Canteaut A., Ishai Y. (eds.) Advances in Cryptology - EUROCRYPT 2020, pp. 169\u2013199. Springer International Publishing, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-45721-1_7."},{"key":"1754_CR29","doi-asserted-by":"publisher","first-page":"544","DOI":"10.1007\/978-3-319-98113-0_29","volume-title":"Security and Cryptography for Networks","author":"S Kim","year":"2018","unstructured":"Kim S., Lewi K., Mandal A., Montgomery H., Roy A., Wu D.J.: Function-hiding inner product encryption is practical. In: Catalano D., De Prisco R. (eds.) Security and Cryptography for Networks, pp. 544\u2013562. Springer International Publishing, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-98113-0_29."},{"issue":"1","key":"1754_CR30","doi-asserted-by":"publisher","first-page":"60","DOI":"10.1007\/s00145-016-9250-8","volume":"31","author":"I Komargodski","year":"2018","unstructured":"Komargodski I., Segev G., Yogev E.: Functional encryption for randomized functionalities in the private-key setting from minimal assumptions. J. Cryptol. 31(1), 60\u2013100 (2018). https:\/\/doi.org\/10.1007\/s00145-016-9250-8.","journal-title":"J. Cryptol."},{"key":"1754_CR31","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1007\/978-3-319-56614-6_2","volume-title":"Advances in Cryptology - EUROCRYPT 2017","author":"S Agrawal","year":"2017","unstructured":"Agrawal S., Wu D.J.: Functional encryption: deterministic to randomized functions from simple assumptions. In: Coron J.S., Nielsen J.B. (eds.) Advances in Cryptology - EUROCRYPT 2017, pp. 30\u201361. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-56614-6_2."},{"key":"1754_CR32","doi-asserted-by":"publisher","first-page":"265","DOI":"10.1007\/11681878_14","volume-title":"Theory of Cryptography","author":"C Dwork","year":"2006","unstructured":"Dwork C., McSherry F., Nissim K., Smith A.: Calibrating noise to sensitivity in private data analysis. In: Halevi S., Rabin T. (eds.) Theory of Cryptography, pp. 265\u2013284. Springer, Berlin, Heidelberg (2006). https:\/\/doi.org\/10.1007\/11681878_14."},{"issue":"2","key":"1754_CR33","doi-asserted-by":"publisher","first-page":"288","DOI":"10.2478\/popets-2020-0028","volume":"2020","author":"D Desfontaines","year":"2020","unstructured":"Desfontaines D., Pej\u00f3 B.: Sok: differential privacies. Proc. Privacy Enhanc. Technol. 2020(2), 288\u2013313 (2020). https:\/\/doi.org\/10.2478\/popets-2020-0028.","journal-title":"Proc. Privacy Enhanc. Technol."},{"key":"1754_CR34","unstructured":"Bureau, P.R.: the U.S. Census Bureau\u2019s 2020 Census Data\u00a0Products, D.\u00a0Team. Why the census bureau chose differential privacy. Census Briefs (2020)"},{"key":"1754_CR35","doi-asserted-by":"publisher","unstructured":"Machanavajjhala, A., Kifer, D., Abowd, J., Gehrke, J., Vilhuber, L.: Privacy: theory meets Practice on the Map. In: 2008 IEEE 24th International Conference on Data Engineering, IEEE, pp. 277\u2013286. Cancun, Mexico (2008). https:\/\/doi.org\/10.1109\/ICDE.2008.4497436","DOI":"10.1109\/ICDE.2008.4497436"},{"key":"1754_CR36","doi-asserted-by":"publisher","unstructured":"Zhang Y., Ramage D., Xu Z., Zhang Y., Zhai S., Kairouz P.: Private federated learning in gboard (2023). https:\/\/doi.org\/10.48550\/arXiv.2306.14793.","DOI":"10.48550\/arXiv.2306.14793"},{"key":"1754_CR37","unstructured":"Ding B., Kulkarni J., Yekhanin S.: Collecting telemetry data privately. Adv. Neural Inf. Proc. Syst. 30, https:\/\/proceedings.neurips.cc\/paper_files\/paper\/2017\/hash\/253614bbac999b38b5b60cae531c4969-Abstract.h (2017)"},{"issue":"302","key":"1754_CR38","doi-asserted-by":"publisher","first-page":"157","DOI":"10.1080\/14786440009463897","volume":"50","author":"K Pearson","year":"1900","unstructured":"Pearson K.: X. On the criterion that a given system of deviations from the probable in the case of a correlated system of variables is such that it can be reasonably supposed to have arisen from random sampling. The Lond. Edinb. Dublin Phil. Mag. J. Sci. 50(302), 157\u2013175 (1900). https:\/\/doi.org\/10.1080\/14786440009463897.","journal-title":"The Lond. Edinb. Dublin Phil. Mag. J. Sci."},{"key":"1754_CR39","first-page":"2111","volume-title":"Proceedings of The 33rd International Conference on Machine Learning, Proceedings of Machine Learning Research","author":"M Gaboardi","year":"2016","unstructured":"Gaboardi M., Lim H., Rogers R., Vadhan S.: Differentially private chi-squared hypothesis testing: goodness of fit and independence testing. In: Balcan M.F., Weinberger K.Q. (eds.) Proceedings of The 33rd International Conference on Machine Learning, Proceedings of Machine Learning Research, vol. 48, pp. 2111\u20132120. PMLR, New York, New York, USA (2016)."},{"key":"1754_CR40","first-page":"16131","volume-title":"Proceedings of the 40th International Conference on Machine Learning, Proceedings of Machine Learning Research","author":"Z Kazan","year":"2023","unstructured":"Kazan Z., Shi K., Groce A., Bray A.P.: The test of tests: a framework for differentially private hypothesis testing. In: Krause A., Brunskill E., Cho K., Engelhardt B., Sabato S., Scarlett J. (eds.) Proceedings of the 40th International Conference on Machine Learning, Proceedings of Machine Learning Research, vol. 202, pp. 16131\u201316151. PMLR (2023)."},{"key":"1754_CR41","doi-asserted-by":"publisher","first-page":"220","DOI":"10.1007\/978-3-031-95767-3_9","volume-title":"Applied Cryptography and Network Security - ACNS 2025","author":"J Zalonis","year":"2025","unstructured":"Zalonis J., Scheu-Hachtel L., Armknecht F.: A New quadratic noisy functional encryption scheme and its application for privacy preserving machine learning. In: Fischlin M., Moonsamy V. (eds.) Applied Cryptography and Network Security - ACNS 2025, pp. 220\u2013250. Springer International Publishing, Cham (2025). https:\/\/doi.org\/10.1007\/978-3-031-95767-3_9."},{"key":"1754_CR42","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-82852-2_2","volume-title":"Selected Areas in Cryptography - SAC 2024","author":"FA Escobar","year":"2025","unstructured":"Escobar F.A., Canard S., Laguillaumie F.: Simulation secure multi-input quadratic functional encryption. In: Eichlseder M., Gambs S. (eds.) Selected Areas in Cryptography - SAC 2024. Springer Nature, Switzerland, Cham (2025). https:\/\/doi.org\/10.1007\/978-3-031-82852-2_2."},{"issue":"4","key":"1754_CR43","doi-asserted-by":"publisher","DOI":"10.1007\/s11432-017-9224-9","volume":"61","author":"Q Zhao","year":"2018","unstructured":"Zhao Q., Zeng Q., Liu X., Xu H.: Simulation-based security of function-hiding inner product encryption. Sci. China. Inf. Sci. 61(4), 048102 (2018).","journal-title":"Sci. China. Inf. Sci."},{"issue":"1","key":"1754_CR44","doi-asserted-by":"publisher","first-page":"242","DOI":"10.1007\/s00145-015-9220-6","volume":"30","author":"G Herold","year":"2017","unstructured":"Herold G., Kiltz E., R\u00e0fols C., Villar J.: An algebraic framework for diffie-hellman assumptions. J. Cryptol. 30(1), 242\u2013288 (2017). https:\/\/doi.org\/10.1007\/s00145-015-9220-6.","journal-title":"J. Cryptol."},{"key":"1754_CR45","doi-asserted-by":"publisher","first-page":"486","DOI":"10.1007\/11761679_29","volume-title":"Advances in Cryptology - EUROCRYPT 2006","author":"C Dwork","year":"2006","unstructured":"Dwork C., Kenthapadi K., McSherry F., Mironov I., Naor M.: Our data, ourselves: privacy via distributed noise generation. In: Vaudenay S. (ed.) Advances in Cryptology - EUROCRYPT 2006, pp. 486\u2013503. Springer, Berlin Heidelberg, Berlin, Heidelberg (2006). https:\/\/doi.org\/10.1007\/11761679_29."},{"key":"1754_CR46","doi-asserted-by":"publisher","unstructured":"Ghosh, A., Roughgarden, T., Sundararajan, M.: Universally utility-maximizing privacy mechanisms. In: Proceedings of the Forty-First Annual ACM Symposium on Theory of Computing, pp. 351\u2013360. Association for Computing Machinery, New York, NY, USA (2009). https:\/\/doi.org\/10.1145\/1536414.1536464","DOI":"10.1145\/1536414.1536464"},{"key":"1754_CR47","doi-asserted-by":"publisher","unstructured":"Abdalla, M., Catalano, D., Fiore, D., Gay, R., Ursu, B.: Multi-input functional encryption for inner products: function-hiding realizations and constructions without pairings. Cryptology ePrint Archive, Paper 2017\/972 (2017). https:\/\/doi.org\/10.1007\/978-3-319-96884-1_20. https:\/\/eprint.iacr.org\/2017\/972","DOI":"10.1007\/978-3-319-96884-1_20"},{"key":"1754_CR48","doi-asserted-by":"publisher","first-page":"126","DOI":"10.1007\/978-3-642-03356-8_8","volume-title":"Advances in Cryptology - CRYPTO 2009","author":"I Mironov","year":"2009","unstructured":"Mironov I., Pandey O., Reingold O., Vadhan S.: Computational differential privacy. In: Halevi S. (ed.) Advances in Cryptology - CRYPTO 2009, pp. 126\u2013142. Springer, Berlin, Heidelberg (2009). https:\/\/doi.org\/10.1007\/978-3-642-03356-8_8."},{"issue":"4","key":"1754_CR49","doi-asserted-by":"publisher","first-page":"437","DOI":"10.1007\/s001450010010","volume":"13","author":"JM Pollard","year":"2000","unstructured":"Pollard J.M.: Kangaroos, monopoly and discrete logarithms. J. Cryptol. 13(4), 437\u2013447 (2000). https:\/\/doi.org\/10.1007\/s001450010010.","journal-title":"J. Cryptol."},{"key":"1754_CR50","unstructured":"Granlund, T.: The GMP development team, GNU MP: The GNU Multiple Precision Arithmetic Library, 6th edn. (2023). http:\/\/gmplib.org\/"},{"key":"1754_CR51","unstructured":"Mitsunari, S.: MCL: a portable and fast pairing-based cryptography library. 1st edn. (2024). https:\/\/github.com\/herumi\/mcl\/tree\/master"},{"key":"1754_CR52","unstructured":"Bowe, S.: BLS12-381: New zk-SNARK Elliptic Curve Construction. https:\/\/electriccoin.co\/blog\/new-snark-curve\/ (March 2017)"}],"container-title":["Designs, Codes and Cryptography"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-025-01754-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10623-025-01754-1","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-025-01754-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,26]],"date-time":"2026-01-26T17:13:03Z","timestamp":1769447583000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10623-025-01754-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,12,9]]},"references-count":52,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2026,1]]}},"alternative-id":["1754"],"URL":"https:\/\/doi.org\/10.1007\/s10623-025-01754-1","relation":{},"ISSN":["0925-1022","1573-7586"],"issn-type":[{"value":"0925-1022","type":"print"},{"value":"1573-7586","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,12,9]]},"assertion":[{"value":"19 December 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"26 September 2025","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 November 2025","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 December 2025","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}],"article-number":"1"}}