Privacy-aware and security-enhanced efficient matchmaking encryption

J Sun, G Xu, T Zhang, X Yang… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Data sharing technologies enable users to outsource data and privately share information
with arbitrary recipients without geographic barriers. However, existing efforts for secure …

A survey on functional encryption

C Mascia, M Sala, I Villa - arxiv preprint arxiv:2106.06306, 2021 - arxiv.org
Functional Encryption (FE) expands traditional public-key encryption in two different ways: it
supports fine-grained access control and allows learning a function of the encrypted data. In …

Functional Encryption Against Probabilistic Queries: Definition, Construction and Applications

G Wang, SF Sun, Z Wang, D Gu - IACR International Conference on …, 2023 - Springer
Functional encryption (FE for short) can be used to calculate a function output of a message,
without revealing other information about the message. There are mainly two types of …

Function-Hiding Zero Predicate Inner Product Functional Encryption from Pairings

M Wan, G Wang, SF Sun, D Gu - International Conference on Information …, 2023 - Springer
In this work, we investigate the possibility of constructing function-hiding predicate functional
encryption (FH-P-FE), which provides full attribute-hiding and function-hiding securities …

Attack and improvement of a hidden vector encryption scheme

K Wang, Z Wang, S Luo, Z Guan - Proceedings of CECNet 2022, 2022 - ebooks.iospress.nl
Abstract Hidden Vector Encryption (HVE) is a new kind of attribute-based encryption in
which a vector is hidden in the ciphertext or linked with the secret key. In ESORICS 2014 …

Small superset and big subset obfuscation

SD Galbraith, T Li - Information Security and Privacy: 26th Australasian …, 2021 - Springer
Abstract Let S={1,\dots, n\} S= 1,⋯, n be a set of integers and X be a subset of S. We study
the boolean function f_X (Y) f X (Y) which outputs 1 if and only if Y is a small enough …

Obfuscation of evasive algebraic set membership

SD Galbraith, T Li - Cryptology ePrint Archive, 2022 - eprint.iacr.org
We define the membership function of a set as the function that determines whether an input
is an element of the set. Canetti, Rothblum, and Varia showed how to obfuscate evasive …

[PDF][PDF] Efficient Function-Hiding Inner Product Functional Encryption and Its Application to Fine-grained Data Sharing

M Wan, G Wang, SF Sun, DW Gu, GY Shi - Journal of Computer Science and … - jcst.ict.ac.cn
In a function-hiding inner product functional encryption (FH-IPFE) scheme, both secret keys
and ciphertexts are associated with vectors. Given a secret key for n-dimensional vector x …

[PDF][PDF] Obfuscation of Big Subsets and Small Supersets as well as Conjunctions

SD Galbraith, T Li - iacr.steepath.eu
We obfuscate the big subset and small superset functionalities in a very simple way. We
prove both VBB and input-hiding in the standard model based on the subset product …

[PDF][PDF] Situation-oriented databases: verifying electronic signatures of heterogeneous documents in a RESTful web service

AS Gusarenko - Modelirovanie, Optimizatsiya i Informatsionnye …, 2022 - scholar.archive.org
When focusing on modern conditions in the field of processing heterogeneous data based
on a situation-oriented approach, the task of using information systems with implemented …