From: Predicate encryption against master-key tampering attacks
Reference | Description | Assumption | Size of PP | Cost of evaluation |
---|---|---|---|---|
- | \(f: \mathbb {Z}_{p}^{t} \times \mathbb {Z}_{p}^{t} \rightarrow \mathbb {Z}_{N}\) | \(t|\mathbb {Z}_{p}|\) | - | |
(Qin et al. 2015)*** | DDH | \(f: \mathbb {H}^{n\times n} \times \mathbb {Z}_{p}^{n} \rightarrow \mathbb {H}^{n}\) | \(2|\mathbb {Z}_{p}| +(n^{2}+1)|\mathbb {H}|\) | 2n2Exp |
DDH | \(f: \mathbb {Z}_{p}^{n+1} \times \{0, 1\}^{n} \rightarrow \mathbb {H}\) | \((n+1)|{\mathbb {Z}_{p}}| + |\mathbb {H}|\) | 1Exp | |
DLIN | \(f: (\mathbb {Z}_{p}^{2\times 2})^{n+1} \times \{0, 1\}^{n} \rightarrow \mathbb {H}\) | \(4(n+1)|{\mathbb {Z}_{p}}| + |\mathbb {H}|\) | 1Exp | |
q-DHI | \(f: \mathbb {Z}_{p} \times \mathbb {Z}_{p} \rightarrow \mathbb {H}\) | \(|{\mathbb {Z}_{p}}| + |\mathbb {H}|\) | 1Exp |