Thursday, December 4, 2025
Science
No Result
View All Result
  • Login
  • HOME
  • SCIENCE NEWS
  • CONTACT US
  • HOME
  • SCIENCE NEWS
  • CONTACT US
No Result
View All Result
Scienmag
No Result
View All Result
Home Science News Policy

Partially-hiding functional encryption for degree-2 polynomials with fine-grained access control

July 5, 2024
in Policy
Reading Time: 2 mins read
0
Table 1
66
SHARES
597
VIEWS
Share on FacebookShare on Twitter
ADVERTISEMENT

Functional Encryption overcomes all-or-nothing limitation of traditional public key encryption. However, there are still very few works that combine access control and function evaluation with concrete schemes. Access control helps maintain the confidentiality of sensitive data by limiting access to authorized personnel only, provides centralized control over access permissions and reduces administrative overhead.

Table 1

Credit: Haifeng QIAN, Cheng LIN, Qiaohan CHU, Jie CHEN

Functional Encryption overcomes all-or-nothing limitation of traditional public key encryption. However, there are still very few works that combine access control and function evaluation with concrete schemes. Access control helps maintain the confidentiality of sensitive data by limiting access to authorized personnel only, provides centralized control over access permissions and reduces administrative overhead.

To solve the problems, a research team led by Haifeng QIAN published their new research on 15 June 2024 in Frontiers of Computer Science co-published by Higher Education Press and Springer Nature.

The team proposed partially-hiding functional encryption schemes with fine-grained access control. Briefly speaking, ciphertexts are generated in accordance with an access policy and secret keys are associated to an attribute and also to being bound to a function. Decryption succeeds only when the attribute in the key satisfies the access policy in the ciphertext.

They follow the framework of Wee’s work (TCC’ 2020) and use the underlying inner product FE with access control (ASIACRYPT’ 2020) relying on the dual system encryption methodology. They give a clear solution to combine PHFE for linear functions with inner product FE with access contro. Then, use the the PHFE for linear functions with access control as a building block and leverage it to achieve PHFE for degree-2 polynomials with access control.

Their two constructions both achieve semi-adaptive, simulation-based security under standard assumptions. The security relies on the reduction from FE for quadratic functions to that for linear functions.

Future work can explore more general functional encryption with access control and apply into practical constructions.

DOI: 10.1007/s11704-023-3461-6



Journal

Frontiers of Computer Science

DOI

10.1007/s11704-023-3461-6

Method of Research

Experimental study

Subject of Research

Not applicable

Article Title

Partially-hiding functional encryption for degree-2 polynomials with fine-grained access control

Article Publication Date

15-Jun-2024

Share26Tweet17
Previous Post

How our brain decodes other people’s gaze

Next Post

Isolation and characterization of amylase enzyme produced by indigenous bacteria from sugar factory waste

Related Posts

blank
Policy

Pain Networks, Sex Differences, and Opioid Use in Asia

November 29, 2025
blank
Policy

Reviewing China’s Liver Cancer Policies: Global Lessons

November 29, 2025
blank
Policy

Social Support Boosts Mpox Care in MSM via Stigma

November 29, 2025
blank
Policy

Drivers of Childhood Immunization in Low-Coverage Philippines

November 29, 2025
blank
Policy

Private Sector Roles in Global NCD Prevention Strategies

November 29, 2025
blank
Policy

Decolonising Global Health Demands Transformative Paradigm Shift

November 29, 2025
Next Post
Isolation and characterization of amylase enzyme produced by indigenous bacteria from sugar factory waste

Isolation and characterization of amylase enzyme produced by indigenous bacteria from sugar factory waste

  • Mothers who receive childcare support from maternal grandparents show more parental warmth, finds NTU Singapore study

    Mothers who receive childcare support from maternal grandparents show more parental warmth, finds NTU Singapore study

    27587 shares
    Share 11032 Tweet 6895
  • University of Seville Breaks 120-Year-Old Mystery, Revises a Key Einstein Concept

    995 shares
    Share 398 Tweet 249
  • Bee body mass, pathogens and local climate influence heat tolerance

    652 shares
    Share 261 Tweet 163
  • Researchers record first-ever images and data of a shark experiencing a boat strike

    522 shares
    Share 209 Tweet 131
  • Groundbreaking Clinical Trial Reveals Lubiprostone Enhances Kidney Function

    490 shares
    Share 196 Tweet 123
Science

Embark on a thrilling journey of discovery with Scienmag.com—your ultimate source for cutting-edge breakthroughs. Immerse yourself in a world where curiosity knows no limits and tomorrow’s possibilities become today’s reality!

RECENT NEWS

  • Boosting Cancer Immunotherapy by Targeting DNA Repair
  • Addressing Dumpsite Risks: A Action Framework for LMICs
  • Evaluating eGFR Equations in Chinese Children
  • Global Guidelines for Shared Decision-Making in Valvular Heart Disease

Categories

  • Agriculture
  • Anthropology
  • Archaeology
  • Athmospheric
  • Biology
  • Blog
  • Bussines
  • Cancer
  • Chemistry
  • Climate
  • Earth Science
  • Marine
  • Mathematics
  • Medicine
  • Pediatry
  • Policy
  • Psychology & Psychiatry
  • Science Education
  • Social Science
  • Space
  • Technology and Engineering

Subscribe to Blog via Email

Enter your email address to subscribe to this blog and receive notifications of new posts by email.

Join 5,191 other subscribers

© 2025 Scienmag - Science Magazine

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In
No Result
View All Result
  • HOME
  • SCIENCE NEWS
  • CONTACT US

© 2025 Scienmag - Science Magazine

Discover more from Science

Subscribe now to keep reading and get access to the full archive.

Continue reading