{"title":"Securing data in the cloud using pairing-free inner product functional encryption with unbounded vector size","authors":"Subhranil Dutta, Ratna Dutta, Sourav Mukhopadhyay","doi":"10.1016/j.tcs.2025.115085","DOIUrl":null,"url":null,"abstract":"<div><div>Cloud computing has emerged as a paradigm shift from traditional computing, enabling data processing, storage, and sharing in potentially insecure environments with applications across sectors such as healthcare, online data storage, media platforms, big data analytics, and e-learning. An advanced cryptographic primitive called <em>inner product functional encryption</em> (<span>IPFE</span>) for the linear function class offers fine-grained access control for sensitive cloud storage, with significant applications in the Internet of Things (IoT), network privacy, mobile device security, cloud security, healthcare access control, and more. Most <span>IPFE</span> schemes compute inner products for fixed-length vectors, requiring predefined bounds on message and key vector sizes at the parameter generation stage. To address this, Tomida et al. (ASIACRYPT 2018) and Dufour-Sans et al. (ACNS 2019) introduced <em>unbounded <span>IPFE</span></em> (<span>UIPFE</span>), which allows for flexible vector lengths in key and ciphertext generation. This adaptability extends <span>IPFE</span>'s applicability to contexts where vector lengths may vary or be unknown in advance. However, existing <span>UIPFE</span> schemes rely on pairing operations, incurring substantial computational costs. This work addresses these limitations by introducing <span>UIPFE</span> schemes that eliminate the need for pairing operations. Our main contributions are as follows:<ul><li><span>–</span><span><div>We propose the <em>first</em> post-quantum secure <em>public-key</em> <span>UIPFE</span> (<span>pubUIPFE</span>) scheme in the random oracle model with adaptive security, leveraging the Learning With Errors (<span>LWE</span>) assumption to reduce computational overhead.</div></span></li><li><span>–</span><span><div>We construct a <em>private-key</em> <span>UIPFE</span> (<span>privUIPFE</span>) scheme in the standard model that offers selective security based on the Decisional Diffie-Hellman (<span>DDH</span>) assumption, featuring linear-size ciphertexts and constant-size keys.</div></span></li></ul></div></div>","PeriodicalId":49438,"journal":{"name":"Theoretical Computer Science","volume":"1031 ","pages":"Article 115085"},"PeriodicalIF":0.9000,"publicationDate":"2025-01-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Theoretical Computer Science","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S0304397525000234","RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"COMPUTER SCIENCE, THEORY & METHODS","Score":null,"Total":0}
引用次数: 0
Abstract
Cloud computing has emerged as a paradigm shift from traditional computing, enabling data processing, storage, and sharing in potentially insecure environments with applications across sectors such as healthcare, online data storage, media platforms, big data analytics, and e-learning. An advanced cryptographic primitive called inner product functional encryption (IPFE) for the linear function class offers fine-grained access control for sensitive cloud storage, with significant applications in the Internet of Things (IoT), network privacy, mobile device security, cloud security, healthcare access control, and more. Most IPFE schemes compute inner products for fixed-length vectors, requiring predefined bounds on message and key vector sizes at the parameter generation stage. To address this, Tomida et al. (ASIACRYPT 2018) and Dufour-Sans et al. (ACNS 2019) introduced unbounded IPFE (UIPFE), which allows for flexible vector lengths in key and ciphertext generation. This adaptability extends IPFE's applicability to contexts where vector lengths may vary or be unknown in advance. However, existing UIPFE schemes rely on pairing operations, incurring substantial computational costs. This work addresses these limitations by introducing UIPFE schemes that eliminate the need for pairing operations. Our main contributions are as follows:
–
We propose the first post-quantum secure public-keyUIPFE (pubUIPFE) scheme in the random oracle model with adaptive security, leveraging the Learning With Errors (LWE) assumption to reduce computational overhead.
–
We construct a private-keyUIPFE (privUIPFE) scheme in the standard model that offers selective security based on the Decisional Diffie-Hellman (DDH) assumption, featuring linear-size ciphertexts and constant-size keys.
期刊介绍:
Theoretical Computer Science is mathematical and abstract in spirit, but it derives its motivation from practical and everyday computation. Its aim is to understand the nature of computation and, as a consequence of this understanding, provide more efficient methodologies. All papers introducing or studying mathematical, logic and formal concepts and methods are welcome, provided that their motivation is clearly drawn from the field of computing.