TY - GEN
T1 - Hierarchical Functional Encryption for Quadratic Transformation
AU - Zhao, Jun
AU - Zhang, Kai
AU - Gong, Junqing
AU - Qian, Haifeng
N1 - Publisher Copyright:
© The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2025.
PY - 2025
Y1 - 2025
N2 - In this paper, we study the notion of hierarchical functional encryption (HFE) which allows the secret key holder to delegate a portion of its decryption ability to others and the delegation can be done in a hierarchical structure. We present the first concrete HFE scheme for quadratic transformations (QT) that enjoys public key, ciphertext, and secret key of linear size in the message size. The scheme achieves semi-adaptive simulation-based security under bilateral k-Lin assumption and k-Lin assumption in the standard model. Besides, we give concrete HFE scheme for linear transformations (LT) based on k-Lin assumption with semi-adaptive simulation-based security; the unique prior construction [ACISP 17] just achieves indistinguishability-based (IND) security. Technically, for constructing HFE-QT scheme, we follow Wee’s concrete functional encryption for quadratic functions (QFE) scheme [TCC 20] where they use inner-product functional encryption (IPFE) as an underlying building block to construct the QFE scheme. In order to achieve our goal, we replace the IPFE with HFE for linear transformations (LT) so that the scheme possesses the property of quadratic transformations and key delegation.
AB - In this paper, we study the notion of hierarchical functional encryption (HFE) which allows the secret key holder to delegate a portion of its decryption ability to others and the delegation can be done in a hierarchical structure. We present the first concrete HFE scheme for quadratic transformations (QT) that enjoys public key, ciphertext, and secret key of linear size in the message size. The scheme achieves semi-adaptive simulation-based security under bilateral k-Lin assumption and k-Lin assumption in the standard model. Besides, we give concrete HFE scheme for linear transformations (LT) based on k-Lin assumption with semi-adaptive simulation-based security; the unique prior construction [ACISP 17] just achieves indistinguishability-based (IND) security. Technically, for constructing HFE-QT scheme, we follow Wee’s concrete functional encryption for quadratic functions (QFE) scheme [TCC 20] where they use inner-product functional encryption (IPFE) as an underlying building block to construct the QFE scheme. In order to achieve our goal, we replace the IPFE with HFE for linear transformations (LT) so that the scheme possesses the property of quadratic transformations and key delegation.
KW - Functional Encryption
KW - Key Delegation
KW - Quadratic Transformation
KW - Semi-adaptive Model
UR - https://www.scopus.com/pages/publications/105005483567
U2 - 10.1007/978-981-96-4734-7_6
DO - 10.1007/978-981-96-4734-7_6
M3 - 会议稿件
AN - SCOPUS:105005483567
SN - 9789819647330
T3 - Lecture Notes in Computer Science
SP - 107
EP - 126
BT - Information Security and Cryptology - 20th International Conference, Inscrypt 2024, Revised Selected Papers
A2 - Lin, Dongdai
A2 - Wang, Meiqin
A2 - Yung, Moti
PB - Springer Science and Business Media Deutschland GmbH
T2 - 20th International Conference on Information Security and Cryptology, Inscrypt 2024
Y2 - 14 December 2024 through 16 December 2024
ER -