Back to Search Start Over

Hierarchical identity-based inner product functional encryption.

Authors :
Song, Ge
Deng, Yuqiao
Huang, Qiong
Peng, Changgen
Tang, Chunming
Wang, Xiaohua
Source :
Information Sciences. Sep2021, Vol. 573, p332-344. 13p.
Publication Year :
2021

Abstract

• Hightlights • The identity of the decryptor in the inner product encryption can be specified precisely. • The identity has a hierarchical structure and supports delegating secret key. • The security is proven under the standard model and not the RO model, so it is more practical. • Theoretical and empirical analysis shows that the program is efficient. Inner product functional encryption (IPFE), as a novel cryptographic primitive, can be classified into public-key IPFE (PK-IPFE) and secret-key IPFE (SK-IPFE). PK-IPFE has the following functions: an encryptor generates the ciphertext by encrypting a vector x → , and a decryptor decrypts the ciphertext and obtains the inner product 〈 x → , y → 〉 if it holds the secret key related to vector y → . The general IPFE cannot describe the hierarchical structure. The superior cannot use the general IPFE to issue the delegating keys for the subordinates, which complicates key management. We first propose a new primitive, hierarchical identity-based PK-IPFE (HID-PK-IPFE). HID-PK-IPFE has the following features. First, the identity of the decryptor can be specified when encrypting. Second, the identity of the recipient has a hierarchical structure. In the hierarchical tree, the upper-level users can generate the private key of the lower-level users; that is, our scheme has a delegation function. We formalize the selective chosen plaintext attack model of HID-PK-IPFE, propose the scheme in the standard model, and prove the security of the scheme on the basis of d -DBDHE assumption. We conducted two sets of simulations. We set the maximum depth of the identity hierarchy to 10, and increased the vector length from 10 to 15. We then listed the time spent by each algorithm in these two ranges. The simulation results show that the running time of each algorithm of our HID-PK-IPFE is completely acceptable in actual application scenarios. [ABSTRACT FROM AUTHOR]

Subjects

Subjects :
*GENERATING functions
*ALGORITHMS

Details

Language :
English
ISSN :
00200255
Volume :
573
Database :
Academic Search Index
Journal :
Information Sciences
Publication Type :
Periodical
Accession number :
151980103
Full Text :
https://doi.org/10.1016/j.ins.2021.05.062