TY - JOUR
T1 - Privacy-preserving and adaptively-secure encryptions with Deterministic Finite Automata policy and their applications
AU - Zhang, Ming Wu
AU - Yang, Bo
AU - Wang, Chun Zhi
AU - Tsuyoshi, Takagi
N1 - Publisher Copyright:
©, 2015, Science Press. All right reserved.
Copyright:
Copyright 2015 Elsevier B.V., All rights reserved.
PY - 2015/4/1
Y1 - 2015/4/1
N2 - Deterministic Finite Automata (DFA) is a useful mathematical tool in defining the finite states and describing the transition among these states. In this paper, we propose two adaptively secure functional encryptions in the standard model that are based on DFA policies. In the first scheme, the ciphertext is associated with a DFA M and the token is associated with an arbitrary length string w, and there is a check algorithm to test whether the string w is accepted by the automata M in the key/ciphertext spaces. In the second scheme, we extend the first scheme to support payload confidentiality, in which the decryption can extract the encrypted message if the associated automata accepts the string. Using the technique of dual system encryption, we prove the schemes can achieve adaptive security under the static assumptions, and we then give the performance evaluation. We also provide the deployments in privacy-preserving outsource computation in cloud, text filtering in firewall, and privacy-carrying DNA match in decentralized network etc.
AB - Deterministic Finite Automata (DFA) is a useful mathematical tool in defining the finite states and describing the transition among these states. In this paper, we propose two adaptively secure functional encryptions in the standard model that are based on DFA policies. In the first scheme, the ciphertext is associated with a DFA M and the token is associated with an arbitrary length string w, and there is a check algorithm to test whether the string w is accepted by the automata M in the key/ciphertext spaces. In the second scheme, we extend the first scheme to support payload confidentiality, in which the decryption can extract the encrypted message if the associated automata accepts the string. Using the technique of dual system encryption, we prove the schemes can achieve adaptive security under the static assumptions, and we then give the performance evaluation. We also provide the deployments in privacy-preserving outsource computation in cloud, text filtering in firewall, and privacy-carrying DNA match in decentralized network etc.
UR - http://www.scopus.com/inward/record.url?scp=84929453249&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84929453249&partnerID=8YFLogxK
U2 - 10.3724/SP.J.1016.2015.00897
DO - 10.3724/SP.J.1016.2015.00897
M3 - Article
AN - SCOPUS:84929453249
SN - 0254-4164
VL - 38
SP - 897
EP - 908
JO - Jisuanji Xuebao/Chinese Journal of Computers
JF - Jisuanji Xuebao/Chinese Journal of Computers
IS - 4
ER -