Privacy-preserving and adaptively-secure encryptions with Deterministic Finite Automata policy and their applications

Ming Wu Zhang, Bo Yang, Chun Zhi Wang, Tsuyoshi Takagi

Research output: Contribution to journalArticle

1 Citation (Scopus)

Abstract

Deterministic Finite Automata (DFA) is a useful mathematical tool in defining the finite states and describing the transition among these states. In this paper, we propose two adaptively secure functional encryptions in the standard model that are based on DFA policies. In the first scheme, the ciphertext is associated with a DFA M and the token is associated with an arbitrary length string w, and there is a check algorithm to test whether the string w is accepted by the automata M in the key/ciphertext spaces. In the second scheme, we extend the first scheme to support payload confidentiality, in which the decryption can extract the encrypted message if the associated automata accepts the string. Using the technique of dual system encryption, we prove the schemes can achieve adaptive security under the static assumptions, and we then give the performance evaluation. We also provide the deployments in privacy-preserving outsource computation in cloud, text filtering in firewall, and privacy-carrying DNA match in decentralized network etc.

Original languageEnglish
Pages (from-to)897-908
Number of pages12
JournalJisuanji Xuebao/Chinese Journal of Computers
Volume38
Issue number4
DOIs
Publication statusPublished - Apr 1 2015

Fingerprint

Finite automata
Cryptography
DNA

All Science Journal Classification (ASJC) codes

  • Software
  • Hardware and Architecture
  • Computer Networks and Communications
  • Computer Graphics and Computer-Aided Design

Cite this

Privacy-preserving and adaptively-secure encryptions with Deterministic Finite Automata policy and their applications. / Zhang, Ming Wu; Yang, Bo; Wang, Chun Zhi; Takagi, Tsuyoshi.

In: Jisuanji Xuebao/Chinese Journal of Computers, Vol. 38, No. 4, 01.04.2015, p. 897-908.

Research output: Contribution to journalArticle

Zhang, Ming Wu ; Yang, Bo ; Wang, Chun Zhi ; Takagi, Tsuyoshi. / Privacy-preserving and adaptively-secure encryptions with Deterministic Finite Automata policy and their applications. In: Jisuanji Xuebao/Chinese Journal of Computers. 2015 ; Vol. 38, No. 4. pp. 897-908.
@article{2fc7287f6e384360a0839a5071611bd2,
title = "Privacy-preserving and adaptively-secure encryptions with Deterministic Finite Automata policy and their applications",
abstract = "Deterministic Finite Automata (DFA) is a useful mathematical tool in defining the finite states and describing the transition among these states. In this paper, we propose two adaptively secure functional encryptions in the standard model that are based on DFA policies. In the first scheme, the ciphertext is associated with a DFA M and the token is associated with an arbitrary length string w, and there is a check algorithm to test whether the string w is accepted by the automata M in the key/ciphertext spaces. In the second scheme, we extend the first scheme to support payload confidentiality, in which the decryption can extract the encrypted message if the associated automata accepts the string. Using the technique of dual system encryption, we prove the schemes can achieve adaptive security under the static assumptions, and we then give the performance evaluation. We also provide the deployments in privacy-preserving outsource computation in cloud, text filtering in firewall, and privacy-carrying DNA match in decentralized network etc.",
author = "Zhang, {Ming Wu} and Bo Yang and Wang, {Chun Zhi} and Tsuyoshi Takagi",
year = "2015",
month = "4",
day = "1",
doi = "10.3724/SP.J.1016.2015.00897",
language = "English",
volume = "38",
pages = "897--908",
journal = "Jisuanji Xuebao/Chinese Journal of Computers",
issn = "0254-4164",
publisher = "Science Press",
number = "4",

}

TY - JOUR

T1 - Privacy-preserving and adaptively-secure encryptions with Deterministic Finite Automata policy and their applications

AU - Zhang, Ming Wu

AU - Yang, Bo

AU - Wang, Chun Zhi

AU - Takagi, Tsuyoshi

PY - 2015/4/1

Y1 - 2015/4/1

N2 - Deterministic Finite Automata (DFA) is a useful mathematical tool in defining the finite states and describing the transition among these states. In this paper, we propose two adaptively secure functional encryptions in the standard model that are based on DFA policies. In the first scheme, the ciphertext is associated with a DFA M and the token is associated with an arbitrary length string w, and there is a check algorithm to test whether the string w is accepted by the automata M in the key/ciphertext spaces. In the second scheme, we extend the first scheme to support payload confidentiality, in which the decryption can extract the encrypted message if the associated automata accepts the string. Using the technique of dual system encryption, we prove the schemes can achieve adaptive security under the static assumptions, and we then give the performance evaluation. We also provide the deployments in privacy-preserving outsource computation in cloud, text filtering in firewall, and privacy-carrying DNA match in decentralized network etc.

AB - Deterministic Finite Automata (DFA) is a useful mathematical tool in defining the finite states and describing the transition among these states. In this paper, we propose two adaptively secure functional encryptions in the standard model that are based on DFA policies. In the first scheme, the ciphertext is associated with a DFA M and the token is associated with an arbitrary length string w, and there is a check algorithm to test whether the string w is accepted by the automata M in the key/ciphertext spaces. In the second scheme, we extend the first scheme to support payload confidentiality, in which the decryption can extract the encrypted message if the associated automata accepts the string. Using the technique of dual system encryption, we prove the schemes can achieve adaptive security under the static assumptions, and we then give the performance evaluation. We also provide the deployments in privacy-preserving outsource computation in cloud, text filtering in firewall, and privacy-carrying DNA match in decentralized network etc.

UR - http://www.scopus.com/inward/record.url?scp=84929453249&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84929453249&partnerID=8YFLogxK

U2 - 10.3724/SP.J.1016.2015.00897

DO - 10.3724/SP.J.1016.2015.00897

M3 - Article

AN - SCOPUS:84929453249

VL - 38

SP - 897

EP - 908

JO - Jisuanji Xuebao/Chinese Journal of Computers

JF - Jisuanji Xuebao/Chinese Journal of Computers

SN - 0254-4164

IS - 4

ER -