
Abdalla, M., Bourse, F., De Caro, A., and Pointcheval,
D. (2015). Simple functional encryption schemes for
inner products. In IACR International Workshop on
Public Key Cryptography, pages 733–751. Springer.
Abdalla, M., Gay, R., Raykova, M., and Wee, H. (2017).
Multi-input inner-product functional encryption from
pairings. In Annual International Conference on
the Theory and Applications of Cryptographic Tech-
niques. Springer.
Bakas, A. and Michalas, A. (2020). Multi-input func-
tional encryption: efficient applications from symmet-
ric primitives. In IEEE 19th International Confer-
ence on Trust, Security and Privacy in Computing and
Communications (TrustCom), pages 1105–1112.
Bakas, A., Michalas, A., and Dimitriou, T. (2022a). Pri-
vate lives matter: A differential private functional en-
cryption scheme. In Proceedings of the Twelfth ACM
Conference on Data and Application Security and Pri-
vacy, CODASPY ’22, page 300–311, New York, NY,
USA. Association for Computing Machinery.
Bakas, A., Michalas, A., Frimpong, E., and Rabaninejad, R.
(2022b). Feel the quantum functioning: Instantiating
generic multi-input functional encryption from learn-
ing with errors. In Data and Applications Security
and Privacy XXXVI: 36th Annual IFIP WG 11.3 Con-
ference, DBSec 2022, page 279–299. Springer-Verlag.
Bakas, A., Michalas, A., and Ullah, A. (2020). (f) unc-
tional sifting: A privacy-preserving reputation system
through multi-input functional encryption. In Nordic
Conference on Secure IT Systems, pages 111–126.
Bellare, M., Boldyreva, A., and Staddon, J. (2002).
Randomness re-use in multi-recipient encryption
schemeas. In Desmedt, Y. G., editor, Public Key Cryp-
tography — PKC 2003, pages 85–99, Berlin, Heidel-
berg. Springer Berlin Heidelberg.
Boneh, D., Sahai, A., and Waters, B. (2011). Functional
encryption: Definitions and challenges. In Theory of
Cryptography Conference, pages 253–273. Springer.
Castelluccia, C., Chan, A. C.-F., Mykletun, E., and Tsudik,
G. (2009). Efficient and provably secure aggregation
of encrypted data in wireless sensor networks. ACM
Transactions on Sensor Networks, 5(3):1–36.
Darrel Hankers, S. and Vanstone, A. M. (2004). Guide to el-
liptic curve cryptography. Springer Professional Com-
puting, pages XX–312.
Dhanda, S. S., Singh, B., and Jindal, P. (2020). Lightweight
cryptography: A solution to secure iot. Wireless Per-
sonal Communications, 112(3):1947–1980.
Dubrova, E., N
¨
aslund, M., Selander, G., and Lindqvist, F.
(2018). Lightweight message authentication for con-
strained devices. Proceedings of the 11th ACM Con-
ference on Security and Privacy in Wireless and Mo-
bile Networks.
Frimpong, E., Bakas, A., Dang, H.-V., and Michalas, A.
(2020). Do not tell me what i cannot do! (the
constrained device shouted under the cover of the
fog): Implementing symmetric searchable encryption
on constrained devices. Proceedings of the 5th Inter-
national Conference on Internet of Things, Big Data
and Security.
Frimpong, E. and Michalas, A. (2020). Secon-ng: Im-
plementing a lightweight cryptographic library based
on ecdh and ecdsa for the development of secure and
privacy-preserving protocols in contiki-ng. Proceed-
ings of the 35th Annual ACM Symposium on Applied
Computing.
Frimpong, E., Rabbaninejad, R., and Michalas, A. (2021).
Arrows in a quiver: A secure certificateless group key
distribution protocol for drones. Secure IT Systems,
page 31–48.
Goldwasser, S., Gordon, S. D., Goyal, V., Jain, A., Katz, J.,
Liu, F.-H., Sahai, A., Shi, E., and Zhou, H.-S. (2014a).
Multi-input functional encryption. In Nguyen, P. Q.
and Oswald, E., editors, Advances in Cryptology –
EUROCRYPT 2014, pages 578–602, Berlin, Heidel-
berg. Springer Berlin Heidelberg.
Goldwasser, S., Gordon, S. D., Goyal, V., Jain, A., Katz, J.,
Liu, F.-H., Sahai, A., Shi, E., and Zhou, H.-S. (2014b).
Multi-input functional encryption. In Annual Interna-
tional Conference on the Theory and Applications of
Cryptographic Techniques, pages 578–602. Springer.
Goldwasser, S., Kalai, Y. T., Popa, R. A., Vaikuntanathan,
V., and Zeldovich, N. (2013). How to run turing ma-
chines on encrypted data. In Annual Cryptology Con-
ference, pages 536–553. Springer.
He, Z., Furuhed, M., and Raza, S. (2019). Indraj: digi-
tal certificate enrollment for battery-powered wireless
devices. Proceedings of the 12th Conference on Secu-
rity and Privacy in Wireless and Mobile Networks.
Lara-Nino, C. A., Diaz-Perez, A., and Morales-Sandoval,
M. (2018). Elliptic curve lightweight cryptography:
A survey. IEEE Access, 6:72514–72550.
Li, X., Chen, D., Li, C., and Wang, L. (2015). Secure
data aggregation with fully homomorphic encryption
in large-scale wireless sensor networks. Sensors,
15(7):15952–15973.
Oikonomou, G., Duquennoy, S., Elsts, A., Eriksson, J.,
Tanaka, Y., and Tsiftes, N. (2022). The Contiki-NG
open source operating system for next generation IoT
devices. SoftwareX, 18:101089.
Sahai, A. and Seyalioglu, H. (2010). Worry-free encryption:
functional encryption with public keys. In Proceed-
ings of the 17th ACM conference on Computer and
communications security, pages 463–472.
Sans, E. D., Gay, R., and Pointcheval, D. (2018). Reading
in the dark: Classifying encrypted digits with func-
tional encryption. IACR Cryptology ePrint Archive,
2018:206.
Ugus, O., Westhoff, D., Laue, R., Shoufan, A., and Huss,
S. A. (2009). Optimized implementation of ellip-
tic curve based additive homomorphic encryption for
wireless sensor networks. CoRR, abs/0903.3900.
Vinodha, D. and Mary Anita, E. A. (2018). Secure data ag-
gregation techniques for wireless sensor networks: A
review. Archives of Computational Methods in Engi-
neering, 26(4):1007–1027.
Wang, M., He, K., Chen, J., Du, R., Zhang, B., and Li, Z.
(2022). Panda: Lightweight non-interactive privacy-
preserving data aggregation for constrained devices.
Future Generation Computer Systems, 131:28–42.
Waters, B. (2015). A punctured programming approach to
adaptively secure functional encryption. In Annual
Cryptology Conference, pages 678–697. Springer.
IoTBDS 2024 - 9th International Conference on Internet of Things, Big Data and Security
74