Multi-input Functional Encryption: Efficient Applications from Symmetric Primitives

Alexandros Bakas, Antonis Michalas

Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

8 Citations (Scopus)

Abstract

Functional Encryption (FE) allows users who hold a specific secret key (known as the functional key) to learn a specific function of encrypted data whilst learning nothing about the content of the underlying data. Considering this functionality and the fact that the field of FE is still in its infancy, we sought a route to apply this potent tool to design efficient applications. To this end, we first built a symmetric FE scheme for the l 1 norm of a vector space, which allows us to compute the sum of the components of an encrypted vector. Then, we utilized our construction, to design an Order-Revealing Encryption (ORE) scheme and a privately encrypted database. While there is room for improvement in our schemes, this work is among the first attempts that seek to utilize FE for the solution of practical problems that can have a tangible effect on people's daily lives.
Original languageEnglish
Title of host publication19th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom 2020)
PublisherIEEE
Pages1105-1112
Number of pages8
ISBN (Electronic)978-1-6654-0392-4
ISBN (Print)978-1-6654-0393-1
DOIs
Publication statusPublished - 2020
Publication typeA4 Article in conference proceedings
EventIEEE International Conference on Trust, Security and Privacy in Computing and Communications -
Duration: 29 Dec 20201 Jan 2021

Publication series

NameIEEE International Conference on Trust, Security and Privacy in Computing and Communications
ISSN (Print)2324-898X
ISSN (Electronic)2324-9013

Conference

ConferenceIEEE International Conference on Trust, Security and Privacy in Computing and Communications
Period29/12/201/01/21

Publication forum classification

  • Publication forum level 1

Fingerprint

Dive into the research topics of 'Multi-input Functional Encryption: Efficient Applications from Symmetric Primitives'. Together they form a unique fingerprint.

Cite this