Log in

LR-RRA-CCA secure functional encryption for randomized functionalities from trapdoor HPS and LAF

  • Highlight
  • Published:
Science China Information Sciences Aims and scope Submit manuscript

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
EUR 32.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or Ebook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

References

  1. Boneh D, Sahai A, Waters B, et al. Functional encryption: definitions and challenges. In: Proceedings of the 8th Conference on Theory of Cryptography (TCC’11). Berlin: Springer-Verlag, 2011. 253–273

    MATH  Google Scholar 

  2. Agrawal S, Gorbunov S, Vaikuntanathan V, et al. Cryptographic agents: towards a unified theory of computing on encrypted data. In: Advances in Cryptology — EUROCRYPT 2015. Berlin: Springer-Verlag, 2015. 501–531

    Google Scholar 

  3. Ananth P, Brakerski Z, Segev G, et al. From selective to adaptive security in functional encryption. In: Advances in Cryptology — CRYPTO 2015. Berlin: Springer-Verlag, 2015. 657–677

    MATH  Google Scholar 

  4. Goyal V, Jain A, Koppula V, et al. Functional encryption for randomized functionalities. In: Theory of Cryptography. Berlin: Springer-Verlag, 2015. 325–351

    MATH  Google Scholar 

  5. Agrawal S, Wu D J. Functional encryption: deterministic to randomized functions from simple assumptions. In: Advances in Cryptology — EUROCRYPT 2017. Berlin: Springer-Verlag, 2017. 30–61

    MATH  Google Scholar 

  6. Qin B D, Liu S L. Leakage-resilient chosen-ciphertext secure public-key encryption from Hash proof system and one-time lossy filter. In: Advances in Cryptology — ASIACRYPT 2013. Berlin: Springer-Verlag, 2013. 381–400

    MATH  Google Scholar 

  7. Hofheinz H. Circular chosen-ciphertext security with compact ciphertexts. In: Advances in Cryptology — EUROCRYPT 2013. Berlin: Springer-Verlag, 2013. 520–536

    MATH  Google Scholar 

Download references

Acknowledgements

This work was supported by National Natural Science Foundation of China (Grant Nos. 61472114, 61572318, 61702007, 61133014, 61502400), National Key Research and Development Program of China (Grant No. 2017YFB0802003), and other foundations (Grant Nos. 16ZB0140, LD14127X, ZRC2013380).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Kefei Chen.

Additional information

The authors declare that they have no conflict of interest.

Supporting information The supporting information is available online at info.scichina.com and link. springer.com. The supporting materials are published as submitted, without typesetting or editing. The responsibility for scientific accuracy and content remains entirely with the authors.

Electronic supplementary material

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Wang, H., Chen, K., Qin, B. et al. LR-RRA-CCA secure functional encryption for randomized functionalities from trapdoor HPS and LAF. Sci. China Inf. Sci. 61, 058101 (2018). https://doi.org/10.1007/s11432-017-9120-4

Download citation

  • Revised:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s11432-017-9120-4

Navigation