From: Efficient functional encryption for inner product with simulation-based security
Hybrid argument | Ciphertexts | Secret keys |
---|---|---|
Hybrid H2 | \((\boldsymbol {x},\alpha,0,\eta, 0,0)_{\mathbb {B}}\) | \((\boldsymbol {y},0,\beta,0,\theta,0)_{\mathbb {B}^{*}}\) |
Hybrid H3 | \((\boldsymbol {x},\alpha,0,\eta,0,{\gamma }^{\prime })_{\mathbb {B}}\) | \((\boldsymbol {y},0,\beta,0,\theta,0)_{\mathbb {B}^{*}}\) |
Hybrid H4 | \((\boldsymbol {x},\alpha,0,0,0,{\gamma }^{\prime })_{\mathbb {B}}\) | \((\boldsymbol {y},0,\beta,0,\theta,0)_{\mathbb {B}^{*}}\) |
Hybrid H5 | \((\boldsymbol {x},\alpha,0,0,0,{\gamma }^{\prime })_{\mathbb {B}}\) | \((\boldsymbol {y},0,\beta,\tau ^{\prime },\theta,0)_{\mathbb {B}^{*}}\) |
Hybrid H6 | \((\boldsymbol {x},\alpha,0,0,0,{\gamma }^{\prime })_{\mathbb {B}}\) | \((\boldsymbol {y},0,\beta,\tau ^{\prime },0,0)_{\mathbb {B}^{*}}\) |