{"id":"https://openalex.org/W6940928219","doi":"https://doi.org/10.1184/r1/21507948.v1","title":"Multi-Input Inner Product Encryption: Function-hiding instantiations without Random Oracles","display_name":"Multi-Input Inner Product Encryption: Function-hiding instantiations without Random Oracles","publication_year":2022,"publication_date":"2022-01-01","ids":{"openalex":"https://openalex.org/W6940928219","doi":"https://doi.org/10.1184/r1/21507948.v1"},"language":"en","primary_location":{"id":"pmh:oai:figshare.com:article/21507948","is_oa":true,"landing_page_url":null,"pdf_url":null,"source":{"id":"https://openalex.org/S4377196282","display_name":"Figshare","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I4210132348","host_organization_name":"Figshare (United Kingdom)","host_organization_lineage":["https://openalex.org/I4210132348"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Text"},"type":"article","indexed_in":["datacite"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":null,"any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Vanjani, Nikhil","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Vanjani, Nikhil","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":1,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.33178108,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":true,"primary_topic":{"id":"https://openalex.org/T10451","display_name":"Mycorrhizal Fungi and Plant Interactions","score":0.5134999752044678,"subfield":{"id":"https://openalex.org/subfields/1110","display_name":"Plant Science"},"field":{"id":"https://openalex.org/fields/11","display_name":"Agricultural and Biological Sciences"},"domain":{"id":"https://openalex.org/domains/1","display_name":"Life Sciences"}},"topics":[{"id":"https://openalex.org/T10451","display_name":"Mycorrhizal Fungi and Plant Interactions","score":0.5134999752044678,"subfield":{"id":"https://openalex.org/subfields/1110","display_name":"Plant Science"},"field":{"id":"https://openalex.org/fields/11","display_name":"Agricultural and Biological Sciences"},"domain":{"id":"https://openalex.org/domains/1","display_name":"Life Sciences"}},{"id":"https://openalex.org/T10015","display_name":"Genomics and Phylogenetic Studies","score":0.07750000059604645,"subfield":{"id":"https://openalex.org/subfields/1312","display_name":"Molecular Biology"},"field":{"id":"https://openalex.org/fields/13","display_name":"Biochemistry, Genetics and Molecular Biology"},"domain":{"id":"https://openalex.org/domains/1","display_name":"Life Sciences"}},{"id":"https://openalex.org/T10825","display_name":"Plant Pathogens and Fungal Diseases","score":0.0706000030040741,"subfield":{"id":"https://openalex.org/subfields/1307","display_name":"Cell Biology"},"field":{"id":"https://openalex.org/fields/13","display_name":"Biochemistry, Genetics and Molecular Biology"},"domain":{"id":"https://openalex.org/domains/1","display_name":"Life Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/functional-encryption","display_name":"Functional encryption","score":0.9625999927520752},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.7886999845504761},{"id":"https://openalex.org/keywords/random-function","display_name":"Random function","score":0.49570000171661377},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.4860000014305115},{"id":"https://openalex.org/keywords/function","display_name":"Function (biology)","score":0.46709999442100525},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.436599999666214},{"id":"https://openalex.org/keywords/standard-model","display_name":"Standard Model (mathematical formulation)","score":0.3621000051498413},{"id":"https://openalex.org/keywords/semantic-security","display_name":"Semantic security","score":0.3359000086784363}],"concepts":[{"id":"https://openalex.org/C2780746774","wikidata":"https://www.wikidata.org/wiki/Q17014981","display_name":"Functional encryption","level":4,"score":0.9625999927520752},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.7886999845504761},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5879999995231628},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.5821999907493591},{"id":"https://openalex.org/C13929819","wikidata":"https://www.wikidata.org/wiki/Q176737","display_name":"Random function","level":3,"score":0.49570000171661377},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.4860000014305115},{"id":"https://openalex.org/C14036430","wikidata":"https://www.wikidata.org/wiki/Q3736076","display_name":"Function (biology)","level":2,"score":0.46709999442100525},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.436599999666214},{"id":"https://openalex.org/C101454708","wikidata":"https://www.wikidata.org/wiki/Q17106019","display_name":"Standard Model (mathematical formulation)","level":3,"score":0.3621000051498413},{"id":"https://openalex.org/C204806902","wikidata":"https://www.wikidata.org/wiki/Q2333581","display_name":"Semantic security","level":5,"score":0.3359000086784363},{"id":"https://openalex.org/C148220186","wikidata":"https://www.wikidata.org/wiki/Q7111912","display_name":"Outcome (game theory)","level":2,"score":0.3043000102043152},{"id":"https://openalex.org/C2780801425","wikidata":"https://www.wikidata.org/wiki/Q5164392","display_name":"Construct (python library)","level":2,"score":0.3034999966621399},{"id":"https://openalex.org/C94284585","wikidata":"https://www.wikidata.org/wiki/Q228184","display_name":"Random oracle","level":4,"score":0.2953999936580658},{"id":"https://openalex.org/C18396474","wikidata":"https://www.wikidata.org/wiki/Q2465888","display_name":"Secure multi-party computation","level":3,"score":0.29190000891685486},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.28850001096725464},{"id":"https://openalex.org/C7646194","wikidata":"https://www.wikidata.org/wiki/Q4818713","display_name":"Attribute-based encryption","level":4,"score":0.2809000015258789},{"id":"https://openalex.org/C90673727","wikidata":"https://www.wikidata.org/wiki/Q901718","display_name":"Product (mathematics)","level":2,"score":0.27219998836517334},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.2694999873638153},{"id":"https://openalex.org/C163173736","wikidata":"https://www.wikidata.org/wiki/Q3308558","display_name":"Key generation","level":3,"score":0.2669999897480011},{"id":"https://openalex.org/C45374587","wikidata":"https://www.wikidata.org/wiki/Q12525525","display_name":"Computation","level":2,"score":0.26080000400543213}],"mesh":[],"locations_count":2,"locations":[{"id":"pmh:oai:figshare.com:article/21507948","is_oa":true,"landing_page_url":null,"pdf_url":null,"source":{"id":"https://openalex.org/S4377196282","display_name":"Figshare","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I4210132348","host_organization_name":"Figshare (United Kingdom)","host_organization_lineage":["https://openalex.org/I4210132348"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Text"},{"id":"doi:10.1184/r1/21507948.v1","is_oa":true,"landing_page_url":"https://doi.org/10.1184/r1/21507948.v1","pdf_url":null,"source":{"id":"https://openalex.org/S7407050927","display_name":"KiltHub Repository","issn_l":null,"issn":[],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article-journal"}],"best_oa_location":{"id":"pmh:oai:figshare.com:article/21507948","is_oa":true,"landing_page_url":null,"pdf_url":null,"source":{"id":"https://openalex.org/S4377196282","display_name":"Figshare","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I4210132348","host_organization_name":"Figshare (United Kingdom)","host_organization_lineage":["https://openalex.org/I4210132348"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Text"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions","score":0.6824447512626648}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"In":[0,92,203,269],"a":[1,11,16,40,44,55,112,174,186,213,231,242,264,277,304,322,340],"Multi-Input":[2],"Functional":[3,108],"Encryption":[4,109],"(MIFE)":[5],"scheme,":[6],"n":[7,58],"clients":[8,117],"each":[9],"obtain":[10],"secret":[12,28,36],"encryption":[13,238],"key":[14,37,42,50],"from":[15,179,234],"trusted":[17],"authority.":[18],"Each":[19],"client":[20,244],"i":[21],"can":[22,32,51,132,196,273],"encrypt":[23],"its":[24,27,34],"data":[25,80,121],"using":[26],"key.":[29],"The":[30,163,292],"authority":[31],"use":[33],"master":[35],"to":[38,54,139,172,210,241,285,302],"compute":[39],"functional":[41,49,237],"given":[43],"function":[45,84,90,161,281],"f,":[46,85],"and":[47,127,182,316,346],"the":[48,63,68,78,83,128,140,183,198,208,221,248,255,271,328,344,347],"be":[52,133,286],"applied":[53],"collection":[56],"of":[57,65,99,102,114,130,185,267],"clients\u2019":[59,69,79],"ciphertexts,":[60],"resulting":[61,256],"in":[62,276],"outcome":[64,129],"f":[66,131],"on":[67,136,156,220,288,311],"data.":[70,291],"If":[71],"an":[72],"MIFE":[73,103,115,261],"scheme":[74,250,307,325,345],"hides":[75],"not":[76,159],"only":[77,135],"but":[81,336],"also":[82,299],"we":[86,95,195,206],"say":[87],"it":[88],"is":[89,111,193,230,251,254,263],"hiding.":[91],"this":[93,204,333],"work,":[94,205],"study":[96],"function-hiding":[97,175,214,305],"security":[98,330,348],"two":[100],"variants":[101],"for":[104,146,177,216,239,308],"inner-product":[105,147,178],"computations.":[106],"Multi-Client":[107],"(MCFE)":[110],"strengthening":[113],"where":[116],"associate":[118],"their":[119,289],"encrypted":[120,138],"with":[122],"some":[123],"time":[124,142],"step":[125],"t":[126],"computed":[134],"ciphertexts":[137],"same":[141,199,329],"step.":[143],"Although":[144],"MCFE":[145,157,176,215],"computation":[148],"has":[149],"been":[150],"extensively":[151],"studied,":[152],"most":[153],"earlier":[154,334],"works":[155],"do":[158],"achieve":[160,197],"privacy.":[162],"recent":[164],"work":[165,294,335],"by":[166,295],"Agrawal":[167,296],"et":[168,297],"al.":[169,298],"showed":[170,300],"how":[171,301],"construct":[173,303,321],"standard":[180,222,312],"assumptions":[181],"existence":[184],"random":[187,201,318],"oracle.":[188],"An":[189],"intriguing":[190],"open":[191],"question":[192],"whether":[194],"without":[200,317],"oracles.":[202,319],"are":[207],"first":[209],"show":[211],"such":[212],"inner":[217],"products,":[218],"relying":[219,310],"Decisional":[223],"Linear":[224],"assumption.":[225],"Our":[226],"main":[227],"technical":[228],"contribution":[229],"new":[232,323],"upgrade":[233],"single":[235],"input":[236],"inner-products":[240],"multi":[243],"one;":[245],"and,":[246],"if":[247],"single-input":[249],"function-hiding,":[252],"so":[253],"multi-client":[257],"scheme.":[258],"Ad":[259],"Hoc":[260],"(AMIFE)":[262],"decentralized":[265,278],"version":[266],"MIFE.":[268],"AMIFE,":[270],"users":[272],"jointly":[274],"decide":[275],"way":[279],"what":[280],"they":[282],"would":[283],"allow":[284],"evaluated":[287],"joint":[290],"aforementioned":[293],"AMIFE":[306,324],"inner-products,":[309],"bilinear":[313],"group":[314],"assumptions,":[315],"We":[320],"that":[326],"provides":[327,339],"guarantees":[331],"as":[332],"our":[337],"construction":[338],"nicer":[341],"abstraction":[342],"making":[343],"proofs":[349],"conceptually":[350],"simpler.":[351]},"counts_by_year":[],"updated_date":"2025-11-06T06:51:31.235846","created_date":"2025-10-10T00:00:00"}
