TY - JOUR
T1 - Revisits and transformations among functional encryption systems
AU - Zhang, Mingwu
AU - Morozov, Kirill
AU - Takagi, Tsuyoshi
N1 - Funding Information:
This work is supported by the National Natural Science Foundation of China under Grants 61370224 and 61272404, and the Key Program of Natural Science Foundation of Hubei Province under Grant 2013CFA046.
PY - 2014
Y1 - 2014
N2 - Functional encryption provides a general access control over the encrypted data, where only the receiver with attribute x→ that satisfies control policy function fv→ of policy parameter v→ (i.e. fv→x)= 1) can decrypt its ciphertext. Special cases of functional encryption include (anonymous-) (hierarchical) identity-based encryption, fuzzy identity-based encryption, attribute-based encryption, public key encryption with keyword search, spatial encryption, inner-product encryption, hidden-vector encryption and predicate encryption. In general functional encryption systems, the control policy function can be set flexibly. The main gap among these functional encryption schemes lies in the policy functions that associates with the secret keys. In this work, we first investigate several functional encryption schemes, and then formalize and unify the functionality description of the control policies for these schemes. After giving a general definition and security model, we present the relationship and transformations among functional encryption schemes when the equivalence of these different policy functions is employed.
AB - Functional encryption provides a general access control over the encrypted data, where only the receiver with attribute x→ that satisfies control policy function fv→ of policy parameter v→ (i.e. fv→x)= 1) can decrypt its ciphertext. Special cases of functional encryption include (anonymous-) (hierarchical) identity-based encryption, fuzzy identity-based encryption, attribute-based encryption, public key encryption with keyword search, spatial encryption, inner-product encryption, hidden-vector encryption and predicate encryption. In general functional encryption systems, the control policy function can be set flexibly. The main gap among these functional encryption schemes lies in the policy functions that associates with the secret keys. In this work, we first investigate several functional encryption schemes, and then formalize and unify the functionality description of the control policies for these schemes. After giving a general definition and security model, we present the relationship and transformations among functional encryption schemes when the equivalence of these different policy functions is employed.
UR - http://www.scopus.com/inward/record.url?scp=84906544838&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84906544838&partnerID=8YFLogxK
U2 - 10.1080/02564602.2014.891385
DO - 10.1080/02564602.2014.891385
M3 - Article
AN - SCOPUS:84906544838
VL - 31
SP - 103
EP - 114
JO - IETE Technical Review (Institution of Electronics and Telecommunication Engineers, India)
JF - IETE Technical Review (Institution of Electronics and Telecommunication Engineers, India)
SN - 0256-4602
IS - 1
ER -