• HOME
  • NEWS
  • EXPLORE
    • CAREER
      • Companies
      • Jobs
    • EVENTS
    • iGEM
      • News
      • Team
    • PHOTOS
    • VIDEO
    • WIKI
  • BLOG
  • COMMUNITY
    • FACEBOOK
    • INSTAGRAM
    • TWITTER
Tuesday, May 20, 2025
BIOENGINEER.ORG
No Result
View All Result
  • Login
  • HOME
  • NEWS
  • EXPLORE
    • CAREER
      • Companies
      • Jobs
        • Lecturer
        • PhD Studentship
        • Postdoc
        • Research Assistant
    • EVENTS
    • iGEM
      • News
      • Team
    • PHOTOS
    • VIDEO
    • WIKI
  • BLOG
  • COMMUNITY
    • FACEBOOK
    • INSTAGRAM
    • TWITTER
  • HOME
  • NEWS
  • EXPLORE
    • CAREER
      • Companies
      • Jobs
        • Lecturer
        • PhD Studentship
        • Postdoc
        • Research Assistant
    • EVENTS
    • iGEM
      • News
      • Team
    • PHOTOS
    • VIDEO
    • WIKI
  • BLOG
  • COMMUNITY
    • FACEBOOK
    • INSTAGRAM
    • TWITTER
No Result
View All Result
Bioengineer.org
No Result
View All Result
Home NEWS Science News

Partially-hiding functional encryption for degree-2 polynomials with fine-grained access control

by
July 5, 2024
in Science News
Reading Time: 2 mins read
0
ADVERTISEMENT
Share on FacebookShare on TwitterShare on LinkedinShare on RedditShare on Telegram

Functional Encryption overcomes all-or-nothing limitation of traditional public key encryption. However, there are still very few works that combine access control and function evaluation with concrete schemes. Access control helps maintain the confidentiality of sensitive data by limiting access to authorized personnel only, provides centralized control over access permissions and reduces administrative overhead.

Table 1

Credit: Haifeng QIAN, Cheng LIN, Qiaohan CHU, Jie CHEN

Functional Encryption overcomes all-or-nothing limitation of traditional public key encryption. However, there are still very few works that combine access control and function evaluation with concrete schemes. Access control helps maintain the confidentiality of sensitive data by limiting access to authorized personnel only, provides centralized control over access permissions and reduces administrative overhead.

To solve the problems, a research team led by Haifeng QIAN published their new research on 15 June 2024 in Frontiers of Computer Science co-published by Higher Education Press and Springer Nature.

The team proposed partially-hiding functional encryption schemes with fine-grained access control. Briefly speaking, ciphertexts are generated in accordance with an access policy and secret keys are associated to an attribute and also to being bound to a function. Decryption succeeds only when the attribute in the key satisfies the access policy in the ciphertext.

They follow the framework of Wee’s work (TCC’ 2020) and use the underlying inner product FE with access control (ASIACRYPT’ 2020) relying on the dual system encryption methodology. They give a clear solution to combine PHFE for linear functions with inner product FE with access contro. Then, use the the PHFE for linear functions with access control as a building block and leverage it to achieve PHFE for degree-2 polynomials with access control.

Their two constructions both achieve semi-adaptive, simulation-based security under standard assumptions. The security relies on the reduction from FE for quadratic functions to that for linear functions.

Future work can explore more general functional encryption with access control and apply into practical constructions.

DOI: 10.1007/s11704-023-3461-6



Journal

Frontiers of Computer Science

DOI

10.1007/s11704-023-3461-6

Method of Research

Experimental study

Subject of Research

Not applicable

Article Title

Partially-hiding functional encryption for degree-2 polynomials with fine-grained access control

Article Publication Date

15-Jun-2024

Share12Tweet8Share2ShareShareShare2

Related Posts

Evaluating Amikacin Pharmacokinetics for Your Unit

Evaluating Amikacin Pharmacokinetics for Your Unit

May 20, 2025
An illustration of the genetic and expression map of the PWS critical region (15q11-q13).

Prader-Willi Syndrome Uncovers Distinct Genetic Connection to Psychiatric Disorders

May 20, 2025

Scientists Discover Molecular Brake Controlling Synaptic Maturation

May 20, 2025

KNN Predicts Hemorrhagic Shock Severity Non-Invasively

May 20, 2025

POPULAR NEWS

  • blank

    Volatile-Rich Cap Found Above Yellowstone Magma

    666 shares
    Share 266 Tweet 166
  • Natural Supplement Shows Potential to Slow Biological Aging and Enhance Muscle Strength

    90 shares
    Share 36 Tweet 23
  • Analysis of Research Grant Terminations at the National Institutes of Health

    79 shares
    Share 32 Tweet 20
  • Health Octo Tool Links Personalized Health, Aging Rate

    66 shares
    Share 26 Tweet 17

About

We bring you the latest biotechnology news from best research centers and universities around the world. Check our website.

Follow us

Recent News

Evaluating Amikacin Pharmacokinetics for Your Unit

Prader-Willi Syndrome Uncovers Distinct Genetic Connection to Psychiatric Disorders

Scientists Discover Molecular Brake Controlling Synaptic Maturation

  • Contact Us

Bioengineer.org © Copyright 2023 All Rights Reserved.

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In
No Result
View All Result
  • Homepages
    • Home Page 1
    • Home Page 2
  • News
  • National
  • Business
  • Health
  • Lifestyle
  • Science

Bioengineer.org © Copyright 2023 All Rights Reserved.