{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T23:29:36Z","timestamp":1740180576033,"version":"3.37.3"},"reference-count":41,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2021,1,6]],"date-time":"2021-01-06T00:00:00Z","timestamp":1609891200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2021,1,6]],"date-time":"2021-01-06T00:00:00Z","timestamp":1609891200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61872152"],"award-info":[{"award-number":["61872152"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cybersecur"],"published-print":{"date-parts":[[2021,12]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>Functional encryption (FE) is a novel paradigm for encryption scheme which allows tremendous flexibility in accessing encrypted information. In FE, a user can learn specific function of encrypted messages by restricted functional key and reveal nothing else about the messages. Inner product encryption (IPE) is a special type of functional encryption where the decryption algorithm, given a ciphertext related to a vector <jats:bold><jats:italic>x<\/jats:italic><\/jats:bold> and a secret key related to a vector <jats:bold><jats:italic>y<\/jats:italic><\/jats:bold>, computes the inner product <jats:bold><jats:italic>x<\/jats:italic><\/jats:bold>\u00b7<jats:bold><jats:italic>y<\/jats:italic><\/jats:bold>. In this paper, we construct an efficient private-key functional encryption (FE) for inner product with simulation-based security, which is much stronger than indistinguishability-based security, under the External Decisional Linear assumption in the standard model. Compared with the existing schemes, our construction is faster in encryption and decryption, and the master secret key, secret keys and ciphertexts are shorter.<\/jats:p>","DOI":"10.1186\/s42400-020-00067-1","type":"journal-article","created":{"date-parts":[[2021,1,6]],"date-time":"2021-01-06T22:03:49Z","timestamp":1609970629000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Efficient functional encryption for inner product with simulation-based security"],"prefix":"10.1186","volume":"4","author":[{"given":"Wenbo","family":"Liu","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7666-8985","authenticated-orcid":false,"given":"Qiong","family":"Huang","sequence":"additional","affiliation":[]},{"given":"Xinjian","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Hongbo","family":"Li","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,1,6]]},"reference":[{"key":"67_CR1","doi-asserted-by":"publisher","first-page":"733","DOI":"10.1007\/978-3-662-46447-2_33","volume-title":"Public-Key Cryptography - PKC 2015","author":"M Abdalla","year":"2015","unstructured":"Abdalla, M, Bourse F, Caro AD, Pointcheval D (2015) Simple functional encryption schemes for inner products. In: Katz J (ed)Public-Key Cryptography - PKC 2015, 733\u2013751.. Springer, Berlin."},{"key":"67_CR2","first-page":"11","volume":"2016","author":"M Abdalla","year":"2016","unstructured":"Abdalla, M, Bourse F, Caro AD, Pointcheval D (2016) Better security for functional encryption for inner product evaluations. IACR Cryptol ePrint Arch 2016:11.","journal-title":"IACR Cryptol ePrint Arch"},{"key":"67_CR3","first-page":"601","volume-title":"Annual International Conference on the Theory and Applications of Cryptographic Techniques","author":"M Abdalla","year":"2017","unstructured":"Abdalla, M, Gay R, Raykova M, Wee H (2017) Multi-input inner-product functional encryption from pairings In: Annual International Conference on the Theory and Applications of Cryptographic Techniques, 601\u2013626.. Springer International Publishing, Cham."},{"issue":"4","key":"67_CR4","doi-asserted-by":"publisher","first-page":"833","DOI":"10.1007\/s00145-015-9211-7","volume":"29","author":"M Abe","year":"2016","unstructured":"Abe, M, Nishimaki R, Chase M, David B, Kohlweiss M, Ohkubo M (2016) Constant-size structure-preserving signatures: Generic constructions and simple assumptions. J Cryptol 29(4):833\u2013878.","journal-title":"J Cryptol"},{"key":"67_CR5","doi-asserted-by":"crossref","unstructured":"Agrawal, S, Agrawal S, Badrinarayanan S, Kumarasubramanian A, Prabhakaran M, Sahai A (2015) On the practical security of inner product functional encryption. Public-Key Cryptography \u2013 PKC 2015 :777\u2013798.","DOI":"10.1007\/978-3-662-46447-2_35"},{"key":"67_CR6","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1007\/978-3-030-45374-9_2","volume":"12110","author":"S Agrawal","year":"2020","unstructured":"Agrawal, S, Libert B, Maitra M, Titiu R (2020) Adaptive simulation security for inner product functional encryption. Public-Key Cryptography -PKC 2020 12110:34\u201364.","journal-title":"Public-Key Cryptography -PKC 2020"},{"key":"67_CR7","doi-asserted-by":"crossref","unstructured":"Agrawal, S, Libert B, Stehle D (2016) Fully secure functional encryption for inner products, from standard assumptions. Advances in Cryptology \u2013 CRYPTO 2016 :333\u2013362.","DOI":"10.1007\/978-3-662-53015-3_12"},{"key":"67_CR8","doi-asserted-by":"publisher","first-page":"384","DOI":"10.1007\/978-3-642-13013-7_23","volume-title":"Public Key Cryptography \u2013 PKC 2010","author":"N Attrapadung","year":"2010","unstructured":"Attrapadung, N, Libert B (2010) Functional encryption for inner product: Achieving constant-size ciphertexts with adaptive security or support for negation. In: Nguyen PQ Pointcheval D (eds)Public Key Cryptography \u2013 PKC 2010, 384\u2013402.. Springer Berlin Heidelberg, Berlin."},{"key":"67_CR9","doi-asserted-by":"crossref","unstructured":"Baltico, CEZ, Catalano D, Fiore D, Gay R (2017) Practical functional encryption for quadratic functions with applications to predicate encryption. Advances in Cryptology \u2013 CRYPTO 2017 :67\u201398.","DOI":"10.1007\/978-3-319-63688-7_3"},{"key":"67_CR10","doi-asserted-by":"publisher","first-page":"470","DOI":"10.1007\/978-3-662-48797-6_20","volume-title":"Advances in Cryptology - ASIACRYPT 2015","author":"A Bishop","year":"2015","unstructured":"Bishop, A, Jain A, Kowalczyk L (2015) Function-hiding inner product encryption In: Advances in Cryptology - ASIACRYPT 2015, 470\u2013491.. Springer Berlin Heidelberg, Berlin."},{"key":"67_CR11","doi-asserted-by":"crossref","unstructured":"Boneh, D, Franklin M (2001) Identity-based encryption from the weil pairing, 213\u2013229.. Springer Berlin Heidelberg, Berlin.","DOI":"10.1007\/3-540-44647-8_13"},{"key":"67_CR12","doi-asserted-by":"publisher","first-page":"519","DOI":"10.1007\/978-3-642-40084-1_29","volume-title":"Advances in Cryptology \u2013 CRYPTO 2013","author":"AD Caro","year":"2013","unstructured":"Caro, AD, Iovino V, Jain A, O\u2019Neill A, Paneth O, Persiano G (2013) On the achievability of simulation-based security for functional encryption. In: Canetti R Garay JA (eds)Advances in Cryptology \u2013 CRYPTO 2013, 519\u2013535.. Springer Berlin Heidelberg, Berlin."},{"key":"67_CR13","first-page":"102","volume-title":"Pairing-Based Cryptography - Paring 2012","author":"AD Caro","year":"2012","unstructured":"Caro, AD, Iovino V, Persiano G (2012) Fully secure hidden vector encryption In: Pairing-Based Cryptography - Paring 2012, 102\u2013121.. Springer Berlin Heidelberg, Berlin."},{"key":"67_CR14","first-page":"253","volume-title":"Theory of Cryptography Conference","author":"B Dan","year":"2011","unstructured":"Dan, B, Sahai A, Waters B (2011) Functional encryption: Definitions and challenges In: Theory of Cryptography Conference, 253\u2013273.. Springer Berlin Heidelberg, Berlin."},{"key":"67_CR15","doi-asserted-by":"crossref","unstructured":"Datta, P, Dutta R, Mukhopadhyay S (2016) Functional encryption for inner product with full function privacy. Public-Key Cryptography - PKC 2016:164\u2013195.","DOI":"10.1007\/978-3-662-49384-7_7"},{"key":"67_CR16","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1016\/j.tcs.2016.12.024","volume":"667","author":"P Datta","year":"2017","unstructured":"Datta, P, Dutta R, Mukhopadhyay S (2017) Strongly full-hiding inner product encryption. Theor Comput Sci 667:16\u201350.","journal-title":"Theor Comput Sci"},{"key":"67_CR17","doi-asserted-by":"publisher","first-page":"245","DOI":"10.1007\/978-3-319-76581-5_9","volume-title":"Public-Key Cryptography, PKC 2018","author":"P Datta","year":"2018","unstructured":"Datta, P, Okamoto T, Tomida J (2018) Full-hiding (unbounded) multi-input inner product functional encryption from the K-linear assumption In: Public-Key Cryptography, PKC 2018, 245\u2013277.. Springer International Publishing, Cham."},{"key":"67_CR18","doi-asserted-by":"publisher","first-page":"426","DOI":"10.1007\/978-3-030-21568-2_21","volume-title":"Applied Cryptography and Network Security","author":"E Dufour-Sans","year":"2019","unstructured":"Dufour-Sans, E, Pointcheval D (2019) Unbounded Inner-Product Functional Encryption with Succinct Keys. In: Deng RH, Gauthier-Uma\u00f1a V, Ochoa M, Yung M (eds)Applied Cryptography and Network Security, 426\u2013441.. Springer International Publishing, Cham."},{"key":"67_CR19","doi-asserted-by":"publisher","first-page":"882","DOI":"10.1137\/14095772X","volume":"45","author":"S Garg","year":"2016","unstructured":"Garg, S, Gentry C, Halevi S, Raykova M, Sahai A, Waters B (2016) Candidate indistinguishability obfuscation and functional encryption for all circuits. SIAM J Comput 45:882\u2013929.","journal-title":"SIAM J Comput"},{"key":"67_CR20","doi-asserted-by":"publisher","first-page":"578","DOI":"10.1007\/978-3-642-55220-5_32","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2014","author":"S Goldwasser","year":"2014","unstructured":"Goldwasser, S, Gordon SD, Goyal V, Jain A, Katz J, Liu F-H, Sahai A, Shi E, Zhou H-S (2014) Multi-input functional encryption. In: Nguyen PQ Oswald E (eds)Advances in Cryptology \u2013 EUROCRYPT 2014, 578\u2013602.. Springer Berlin Heidelberg, Berlin."},{"key":"67_CR21","doi-asserted-by":"crossref","unstructured":"Goyal, V, Pandey O, Sahai A, Waters B (2006) Attribute-based encryption for fine-grained access control of encrypted data In: Extended abstract to appear in ACM CCS 2006, 89\u201398.","DOI":"10.1145\/1180405.1180418"},{"key":"67_CR22","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1007\/978-3-540-85538-5_5","volume-title":"Pairing-Based Cryptography \u2013 Paring 2008","author":"V Iovino","year":"2008","unstructured":"Iovino, V, Persiano G (2008) Hidden-vector encryption with groups of prime order In: Pairing-Based Cryptography \u2013 Paring 2008, 75\u201388.. Springer Berlin Heidelberg, Berlin."},{"key":"67_CR23","doi-asserted-by":"publisher","first-page":"146","DOI":"10.1007\/978-3-540-78967-3_9","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2008","author":"J Katz","year":"2008","unstructured":"Katz, J, Sahai A, Waters B (2008) Predicate encryption supporting disjunctions, polynomial equations, and inner products. In: Smart N (ed)Advances in Cryptology \u2013 EUROCRYPT 2008, 146\u2013162.. Springer, Berlin."},{"key":"67_CR24","doi-asserted-by":"publisher","first-page":"113","DOI":"10.1007\/978-3-319-04873-4_7","volume":"8365","author":"Y Kawai","year":"2013","unstructured":"Kawai, Y, Takashima K (2013) Predicate- and attribute-hiding inner product encryption in a public key setting. Lect Notes Comput Sci 8365:113\u2013130.","journal-title":"Lect Notes Comput Sci"},{"key":"67_CR25","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1016\/j.tcs.2019.03.016","volume":"783","author":"S Kim","year":"2019","unstructured":"Kim, S, Kim J, Seo J (2019) A new approach to practical function-private inner product encryption. Theoretical Computer Science 783:22\u201340.","journal-title":"Theoretical Computer Science"},{"key":"67_CR26","doi-asserted-by":"publisher","first-page":"544","DOI":"10.1007\/978-3-319-98113-0_29","volume-title":"Security and Cryptography for Networks","author":"S Kim","year":"2018","unstructured":"Kim, S, Lewi K, Mandal A, Montgomery H, Wu DJ (2018) Function-hiding inner product encryption is practical. In: Catalano D De Prisco R (eds)Security and Cryptography for Networks, 544\u2013562.. Springer International Publishing, Cham."},{"key":"67_CR27","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1007\/978-3-642-13190-5_4","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2010","author":"A Lewko","year":"2010","unstructured":"Lewko, A, Okamoto T, Sahai A, Takashima K, Waters B (2010) Fully secure functional encryption: Attribute-based encryption and (hierarchical) inner product encryption. In: Gilbert H (ed)Advances in Cryptology \u2013 EUROCRYPT 2010, 62\u201391.. Springer, Berlin."},{"issue":"2-3","key":"67_CR28","first-page":"725","volume":"77","author":"T Okamoto","year":"2011","unstructured":"Okamoto, T (2011) Achieving short ciphertexts or short secret-keys for adaptively secure general inner product encryption. Cans 77(2-3):725\u2013771.","journal-title":"Cans"},{"key":"67_CR29","first-page":"214","volume-title":"International Conference on Advances in Cryptology\u2013Asiacrypt","author":"T Okamoto","year":"2009","unstructured":"Okamoto, T, Takashima K (2009) Hierarchical predicate encryption for inner-products In: International Conference on Advances in Cryptology\u2013Asiacrypt, 214\u2013231.. Springer Berlin Heidelberg, Berlin."},{"key":"67_CR30","doi-asserted-by":"publisher","first-page":"591","DOI":"10.1007\/978-3-642-29011-4_35","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2012","author":"T Okamoto","year":"2012","unstructured":"Okamoto, T, Takashima K (2012) Adaptively attribute-hiding (hierarchical) inner product encryption. In: Pointcheval D Johansson T (eds)Advances in Cryptology \u2013 EUROCRYPT 2012, 591\u2013608.. Springer Berlin Heidelberg, Berlin."},{"key":"67_CR31","doi-asserted-by":"publisher","first-page":"349","DOI":"10.1007\/978-3-642-34961-4_22","volume-title":"Advances in Cryptology \u2013 ASIACRYPT 2012","author":"T Okamoto","year":"2012","unstructured":"Okamoto, T, Takashima K (2012) Fully secure unbounded inner-product and attribute-based encryption. In: Wang X Sako K (eds)Advances in Cryptology \u2013 ASIACRYPT 2012, 349\u2013366.. Springer Berlin Heidelberg, Berlin."},{"issue":"1","key":"67_CR32","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1587\/transfun.E98.A.3","volume":"E98.A","author":"T Okamoto","year":"2015","unstructured":"Okamoto, T, Takashima K (2015) Dual pairing vector spaces and their applications. IEICE Trans Fundam Electron Commun Comput Sci E98.A(1):3\u201315.","journal-title":"IEICE Trans Fundam Electron Commun Comput Sci"},{"key":"67_CR33","first-page":"556","volume":"2010","author":"A O\u2019Neill","year":"2010","unstructured":"O\u2019Neill, A (2010) Definitional issues in functional encryption. IACR Cryptol ePrint Arch 2010:556.","journal-title":"IACR Cryptol ePrint Arch"},{"key":"67_CR34","doi-asserted-by":"publisher","first-page":"235","DOI":"10.1007\/s10623-010-9405-9","volume":"58","author":"JH Park","year":"2011","unstructured":"Park, JH (2011) Inner-product encryption under standard assumptions. Des Codes Crypt 58:235\u2013257.","journal-title":"Des Codes Crypt"},{"key":"67_CR35","doi-asserted-by":"publisher","first-page":"457","DOI":"10.1007\/978-3-642-00457-5_27","volume-title":"Theory of Cryptography","author":"E Shen","year":"2009","unstructured":"Shen, E, Shi E, Waters B (2009) Predicate privacy in encryption systems In: Theory of Cryptography, 457\u2013473.. Springer Berlin Heidelberg, Berlin."},{"key":"67_CR36","first-page":"408","volume":"9866","author":"J Tomida","year":"2016","unstructured":"Tomida, J, Abe M, Okamoto T (2016) Efficient functional encryption for inner-product values with full-hiding security. Information Security 9866:408\u2013425.","journal-title":"Information Security"},{"key":"67_CR37","doi-asserted-by":"publisher","first-page":"609","DOI":"10.1007\/978-3-030-03329-3_21","volume-title":"Advances in Cryptology \u2013 ASIACRYPT 2018","author":"J Tomida","year":"2018","unstructured":"Tomida, J, Takashima K (2018) Unbounded Inner Product Functional Encryption from Bilinear Maps. In: Peyrin T Galbraith S (eds)Advances in Cryptology \u2013 ASIACRYPT 2018, 609\u2013639.. Springer International Publishing, Cham."},{"issue":"1","key":"67_CR38","first-page":"209","volume":"15","author":"Y Zhang","year":"2019","unstructured":"Zhang, Y, Li Y, Wang Y (2019) Efficient inner encryption for mobile clients with constrained computation capacity. Int J Innov Comput Inf Control 15(1):209\u2013226.","journal-title":"Int J Innov Comput Inf Control"},{"key":"67_CR39","first-page":"1","volume":"2018","author":"Q Zhao","year":"2018","unstructured":"Zhao, Q, Zeng Q, Liu X (2018) Improved construction for inner product functional encryption. Secur Commu Netw 2018:1\u201312.","journal-title":"Secur Commu Netw"},{"issue":"4","key":"67_CR40","doi-asserted-by":"publisher","first-page":"048102","DOI":"10.1007\/s11432-017-9224-9","volume":"61","author":"Q Zhao","year":"2018","unstructured":"Zhao, Q, Zeng Q, Liu X, Xu H (2018) Simulation-based security of function-hiding inner product encryption. Sci Chin Inf Sc 61(4):048102.","journal-title":"Sci Chin Inf Sc"},{"key":"67_CR41","doi-asserted-by":"crossref","unstructured":"Zhenlin, T, Wei Z (2015) A predicate encryption scheme supporting multiparty cloud computation In: 2015 International Conference on Intelligent Networking and Collaborative Systems, 252\u2013256.","DOI":"10.1109\/INCoS.2015.51"}],"container-title":["Cybersecurity"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s42400-020-00067-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1186\/s42400-020-00067-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s42400-020-00067-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,1,7]],"date-time":"2021-01-07T09:05:22Z","timestamp":1610010322000},"score":1,"resource":{"primary":{"URL":"https:\/\/cybersecurity.springeropen.com\/articles\/10.1186\/s42400-020-00067-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,1,6]]},"references-count":41,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2021,12]]}},"alternative-id":["67"],"URL":"https:\/\/doi.org\/10.1186\/s42400-020-00067-1","relation":{},"ISSN":["2523-3246"],"issn-type":[{"type":"electronic","value":"2523-3246"}],"subject":[],"published":{"date-parts":[[2021,1,6]]},"assertion":[{"value":"4 August 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"15 December 2020","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 January 2021","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The authors declare that they have no competing interests.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"2"}}