ACRYPT 2011, pages 21–40. Springer, Berlin, Hei-
delberg.
Attrapadung, N. (2014). Dual System Encryption via
Doubly Selective Security: Framework, Fully Secure
Functional Encryption for Regular Languages, and
More. In Nguyen, P. Q. and Oswald, E., editors,
Advances in Cryptology – EUROCRYPT 2014, pages
557–577. Springer, Berlin, Heidelberg.
Attrapadung, N. and Libert, B. (2010). Functional Encryp-
tion for Inner Product: Achieving Constant-Size Ci-
phertexts with Adaptive Security or Support for Nega-
tion. In Nguyen, P. Q. and Pointcheval, D., editors,
Public Key Cryptography – PKC 2010, pages 384–
402. Springer, Berlin, Heidelberg.
Attrapadung, N. and Libert, B. (2012). Functional Encryp-
tion for Public-attribute Inner Products: Achieving
Constant-size Ciphertexts with Adaptive Security or
Support for Negation. J. Mathematical Cryptology,
5(2):115–158.
Boneh, D., Boyen, X., and Goh, E.-J. (2005). Hierarchical
Identity Based Encryption with Constant Size Cipher-
text. In Cramer, R., editor, Advances in Cryptology –
EUROCRYPT 2005, pages 440–456. Springer, Berlin,
Heidelberg.
Boneh, D. and Waters, B. (2007). Conjunctive, Subset,
and Range Queries on Encrypted Data. In Vadhan,
S. P., editor, Theory of Cryptography, pages 535–554.
Springer, Berlin, Heidelberg.
Chen, J., Gong, J., and Wee, H. (2018). Improved Inner-
Product Encryption with Adaptive Security and Full
Attribute-Hiding. In Peyrin, T. and Galbraith, S., ed-
itors, Advances in Cryptology - ASIACRYPT 2018,
pages 673–702, Springer, Cham.
Huang, S.-Y., Fan, C.-I., and Tseng, Y.-F. (2016). En-
abled/Disabled Predicate Encryption in Clouds. Fu-
ture Generation Computer Systems, 62:148 – 160.
K. Xagawa, K. (2013). Improved (Hierarchical) Inner-
Product Encryption from Lattices. In Kurosawa, K.
and Hanaoka, G., editors, Public-Key Cryptography –
PKC 2013, pages 235–252. Springer, Berlin, Heidel-
berg.
Katz, J., Sahai, A., and Waters, B. (2008). Predicate En-
cryption Supporting Disjunctions, Polynomial Equa-
tions, and Inner Products. In Smart, N., editor, Ad-
vances in Cryptology – EUROCRYPT 2008, pages
146–162. Springer, Berlin, Heidelberg.
Kawai, Y. and Takashima, K. (2014). Predicate- and
Attribute-Hiding Inner Product Encryption in a Pub-
lic Key Setting. In Cao, Z. and Zhang, F., editors,
Pairing-Based Cryptography – Pairing 2013, pages
113–130, Cham. Springer International Publishing.
Kim, I., Hwang, S. O., Park, J. H., and Park, C. (2016). An
Efficient Predicate Encryption with Constant Pairing
Computations and Minimum Costs. IEEE Transac-
tions on Computers, 65(10):2947–2958.
Kurosawa, K. and Phong, L. T. (2017). Anonymous and
Leakage Resilient IBE and IPE. Designs, Codes and
Cryptography, 85(2):273–298.
Lewko, A., Okamoto, T., Sahai, A., Takashima, K., and
Waters, B. (2010). Fully Secure Functional Encryp-
tion: Attribute-Based Encryption and (Hierarchical)
Inner Product Encryption. In Gilbert, H., editor, Ad-
vances in Cryptology – EUROCRYPT 2010, pages 62–
91. Springer, Berlin, Heidelberg.
Li, J., Zhang, D., Lu, X., and Wang, K. (2017). Com-
pact (Targeted Homomorphic) Inner Product Encryp-
tion from LWE. In Qing, S., Mitchell, C., Chen, L.,
and Liu, D., editors, International Conference on In-
formation and Communications Security, pages 132–
140. Springer.
Okamoto, T. and Takashima, K. (2009). Hierarchical Pred-
icate Encryption for Inner-Products. In Matsui, M.,
editor, Advances in Cryptology – ASIACRYPT 2009,
pages 214–231. Springer, Berlin, Heidelberg.
Okamoto, T. and Takashima, K. (2011). Achieving Short
Ciphertexts or Short Secret-Keys for Adaptively Se-
cure General Inner-Product Encryption. In Lin, D.,
Tsudik, G., and Wang, X., editors, Cryptology and
Network Security, pages 138–159. Springer, Berlin,
Heidelberg.
Okamoto, T. and Takashima, K. (2012a). Adaptively
Attribute-Hiding (Hierarchical) Inner Product En-
cryption. In Pointcheval, D. and Johansson, T., ed-
itors, Advances in Cryptology – EUROCRYPT 2012,
pages 591–608. Springer, Berlin, Heidelberg.
Okamoto, T. and Takashima, K. (2012b). Fully Secure Un-
bounded Inner-Product and Attribute-Based Encryp-
tion. In Wang, X. and Sako, K., editors, Advances
in Cryptology – ASIACRYPT 2012, pages 349–366.
Springer, Berlin, Heidelberg.
Okamoto, T. and Takashima, K. (2015). Achieving Short
Ciphertexts or Short Secret-keys for Adaptively Se-
cure General Inner-product Encryption. Designs,
Codes and Cryptography, 77(2):725–771.
Park, J. H. (2011). Inner-Product Encryption under Stan-
dard Assumptions. Designs, Codes and Cryptogra-
phy, 58(3):235–257.
Ramanna, S. C. (2016). More Efficient Constructions for
Inner-Product Encryption. In Manulis, M., Sadeghi,
A.-R., and Schneider, S., editors, Applied Cryptogra-
phy and Network Security, pages 231–248. Springer,
Cham.
Tseng, Y.-F., Liu, Z.-Y., and Tso, R. (2020). Practical Pred-
icate Encryption for Inner Product. Cryptology ePrint
Archive, Report 2020/270.
Wang, Z., Fan, X., and Wang, M. (2018). Compact Inner
Product Encryption from LWE. In Qing, S., Mitchell,
C., Chen, L., and Liu, D., editors, Information and
Communications Security, pages 141–153. Springer,
Cham.
Xiao, S., Ge, A., Zhang, J., Ma, C., and Wang, X. (2017).
Asymmetric Searchable Encryption from Inner Prod-
uct Encryption. In Xhafa, F., Barolli, L., and Amato,
F., editors, Advances on P2P, Parallel, Grid, Cloud
and Internet Computing, pages 123–132. Springer,
Cham.
Zhang, Y., Li, Y., and Wang, Y. (2019). Efficient Inner Prod-
uct Encryption for Mobile Client with Constrained
Capacity. International Journal of Innovative Com-
puting, Information and Control, 15(1):209–226.
Zhenlin, T. and Wei, Z. (2015). A Predicate Encryption
Scheme Supporting Multiparty Cloud Computation.
In 2015 International Conference on Intelligent Net-
working and Collaborative Systems, pages 252–256.
SECRYPT 2020 - 17th International Conference on Security and Cryptography
558