## Cryptology ePrint Archive: Report 2018/487

Unbounded Inner-Product Functional Encryption, with Succinct Keys

Edouard Dufour-Sans and David Pointcheval

Abstract: In 2015, Abdalla et al. introduced Inner-Product Functional Encryption, where both ciphertexts and decryption keys are vectors of fixed size $n$, and keys enable the computation of an inner product between the two. In practice, however, the size of the data parties are dealing with may vary over time. Having a public key of size $n$ can also be inconvenient when dealing with very large vectors. We define the Unbounded Inner-Product functionality in the context of Public-Key Functional Encryption, and introduce schemes that realize it under standard assumptions. In an Unbounded Inner-Product Functional Encryption scheme, a public key allows anyone to encrypt unbounded vectors, that are essentially mappings from $\mathbb{N}^*$ to $\mathbb{Z}_p$. The owner of the master secret key can generate functional decryption keys for other unbounded vectors. These keys enable one to evaluate the inner product between the unbounded vector underlying the ciphertext and the unbounded vector in the functional decryption key, provided certain conditions on the two vectors are met. We build Unbounded Inner-Product Functional Encryption by introducing pairings, using a technique similar to that of Boneh-Franklin Identity-Based Encryption. A byproduct of this is that our scheme can be made Identity-Based "for free". It is also the first Public-Key Inner-Product Functional Encryption Scheme with a constant size public key (and master secret key), as well constant-size functional decryption keys: each consisting of just one group element.

Category / Keywords: public-key cryptography / Unbounded Vectors, Functional Encryption, Inner Product

Original Publication (in the same form): Conference on Applied Cryptography and Network Security (ACNS '19)
DOI:
10.1007/978-3-030-21568-2_21

Date: received 19 May 2018, last revised 25 Oct 2020

Contact author: e dufoursans at gmail com

Available format(s): PDF | BibTeX Citation

Short URL: ia.cr/2018/487

[ Cryptology ePrint archive ]