About | Contact Us | Register | Login
ProceedingsSeriesJournalsSearchEAI
Blockchain Technology and Emerging Applications. Third EAI International Conference, BlockTEA 2023, Wuhan, China, December 2-3, 2023, Proceedings

Research Article

Identity-Based Key Verifiable Inner Product Functional Encryption Scheme

Cite
BibTeX Plain Text
  • @INPROCEEDINGS{10.1007/978-3-031-60037-1_1,
        author={Mingwu Zhang and Chao He and Gang Shen},
        title={Identity-Based Key Verifiable Inner Product Functional Encryption Scheme},
        proceedings={Blockchain Technology and Emerging Applications. Third EAI International Conference, BlockTEA 2023, Wuhan, China, December 2-3, 2023, Proceedings},
        proceedings_a={BLOCKTEA},
        year={2024},
        month={5},
        keywords={Inner Product Functional Encryption Identity-Based Key Verification},
        doi={10.1007/978-3-031-60037-1_1}
    }
    
  • Mingwu Zhang
    Chao He
    Gang Shen
    Year: 2024
    Identity-Based Key Verifiable Inner Product Functional Encryption Scheme
    BLOCKTEA
    Springer
    DOI: 10.1007/978-3-031-60037-1_1
Mingwu Zhang1,*, Chao He1, Gang Shen1
  • 1: School of Computer Science
*Contact email: csmwzhang@gmail.com

Abstract

Functional encryption is a novel form of public key encryption that has captured significant attention since its inception, with researchers proposing a series of theoretical constructions. Functional encryption can be investigated for specific real-world applications such as the evaluation and output from the ciphertexts using the different decryption keys. In this paper, we investigate one of the more popular recent developments in functional encryption, i.e., inner product functional encryption. We address potential issues that inner product functional encryption might encounter in certain scenarios, including the inability to specify the identity of the ciphertext recipient, privacy leakage related to the master secret key vector, and the susceptibility of the decryption key to malicious tampering. In specific contexts, there might be a requirement for ciphertext recipients to be carefully designated. Malicious adversaries holding the decryption key can exploit it to gain insight into the master key or even alter the decryption key information. Consequently, key verification becomes necessary. To address this, we propose an identity-based key verifiable inner product functional encryption scheme (IBVE-IPE), which can effectively resolve the aforementioned issues and is validated for security and practicality through security proofs and performance analyses.

Keywords
Inner Product Functional Encryption Identity-Based Key Verification
Published
2024-05-03
Appears in
SpringerLink
http://dx.doi.org/10.1007/978-3-031-60037-1_1
Copyright © 2023–2025 ICST
EBSCOProQuestDBLPDOAJPortico
EAI Logo

About EAI

  • Who We Are
  • Leadership
  • Research Areas
  • Partners
  • Media Center

Community

  • Membership
  • Conference
  • Recognition
  • Sponsor Us

Publish with EAI

  • Publishing
  • Journals
  • Proceedings
  • Books
  • EUDL