Revisits and transformations among functional encryption systems

Mingwu Zhang, Kirill Morozov, Tsuyoshi Takagi

Research output: Contribution to journalArticle

Abstract

Functional encryption provides a general access control over the encrypted data, where only the receiver with attribute x→ that satisfies control policy function fv→ of policy parameter v→ (i.e. fv→x)= 1) can decrypt its ciphertext. Special cases of functional encryption include (anonymous-) (hierarchical) identity-based encryption, fuzzy identity-based encryption, attribute-based encryption, public key encryption with keyword search, spatial encryption, inner-product encryption, hidden-vector encryption and predicate encryption. In general functional encryption systems, the control policy function can be set flexibly. The main gap among these functional encryption schemes lies in the policy functions that associates with the secret keys. In this work, we first investigate several functional encryption schemes, and then formalize and unify the functionality description of the control policies for these schemes. After giving a general definition and security model, we present the relationship and transformations among functional encryption schemes when the equivalence of these different policy functions is employed.

Original languageEnglish
Pages (from-to)103-114
Number of pages12
JournalIETE Technical Review (Institution of Electronics and Telecommunication Engineers, India)
Volume31
Issue number1
DOIs
Publication statusPublished - Jan 1 2014

Fingerprint

Cryptography
Computer systems
Access control

All Science Journal Classification (ASJC) codes

  • Electrical and Electronic Engineering

Cite this

Revisits and transformations among functional encryption systems. / Zhang, Mingwu; Morozov, Kirill; Takagi, Tsuyoshi.

In: IETE Technical Review (Institution of Electronics and Telecommunication Engineers, India), Vol. 31, No. 1, 01.01.2014, p. 103-114.

Research output: Contribution to journalArticle

@article{8d17f756ed414bb1bfe6c622ce8b683b,
title = "Revisits and transformations among functional encryption systems",
abstract = "Functional encryption provides a general access control over the encrypted data, where only the receiver with attribute x→ that satisfies control policy function fv→ of policy parameter v→ (i.e. fv→x)= 1) can decrypt its ciphertext. Special cases of functional encryption include (anonymous-) (hierarchical) identity-based encryption, fuzzy identity-based encryption, attribute-based encryption, public key encryption with keyword search, spatial encryption, inner-product encryption, hidden-vector encryption and predicate encryption. In general functional encryption systems, the control policy function can be set flexibly. The main gap among these functional encryption schemes lies in the policy functions that associates with the secret keys. In this work, we first investigate several functional encryption schemes, and then formalize and unify the functionality description of the control policies for these schemes. After giving a general definition and security model, we present the relationship and transformations among functional encryption schemes when the equivalence of these different policy functions is employed.",
author = "Mingwu Zhang and Kirill Morozov and Tsuyoshi Takagi",
year = "2014",
month = "1",
day = "1",
doi = "10.1080/02564602.2014.891385",
language = "English",
volume = "31",
pages = "103--114",
journal = "IETE Technical Review (Institution of Electronics and Telecommunication Engineers, India)",
issn = "0256-4602",
publisher = "Medknow Publications and Media Pvt. Ltd",
number = "1",

}

TY - JOUR

T1 - Revisits and transformations among functional encryption systems

AU - Zhang, Mingwu

AU - Morozov, Kirill

AU - Takagi, Tsuyoshi

PY - 2014/1/1

Y1 - 2014/1/1

N2 - Functional encryption provides a general access control over the encrypted data, where only the receiver with attribute x→ that satisfies control policy function fv→ of policy parameter v→ (i.e. fv→x)= 1) can decrypt its ciphertext. Special cases of functional encryption include (anonymous-) (hierarchical) identity-based encryption, fuzzy identity-based encryption, attribute-based encryption, public key encryption with keyword search, spatial encryption, inner-product encryption, hidden-vector encryption and predicate encryption. In general functional encryption systems, the control policy function can be set flexibly. The main gap among these functional encryption schemes lies in the policy functions that associates with the secret keys. In this work, we first investigate several functional encryption schemes, and then formalize and unify the functionality description of the control policies for these schemes. After giving a general definition and security model, we present the relationship and transformations among functional encryption schemes when the equivalence of these different policy functions is employed.

AB - Functional encryption provides a general access control over the encrypted data, where only the receiver with attribute x→ that satisfies control policy function fv→ of policy parameter v→ (i.e. fv→x)= 1) can decrypt its ciphertext. Special cases of functional encryption include (anonymous-) (hierarchical) identity-based encryption, fuzzy identity-based encryption, attribute-based encryption, public key encryption with keyword search, spatial encryption, inner-product encryption, hidden-vector encryption and predicate encryption. In general functional encryption systems, the control policy function can be set flexibly. The main gap among these functional encryption schemes lies in the policy functions that associates with the secret keys. In this work, we first investigate several functional encryption schemes, and then formalize and unify the functionality description of the control policies for these schemes. After giving a general definition and security model, we present the relationship and transformations among functional encryption schemes when the equivalence of these different policy functions is employed.

UR - http://www.scopus.com/inward/record.url?scp=84906544838&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84906544838&partnerID=8YFLogxK

U2 - 10.1080/02564602.2014.891385

DO - 10.1080/02564602.2014.891385

M3 - Article

AN - SCOPUS:84906544838

VL - 31

SP - 103

EP - 114

JO - IETE Technical Review (Institution of Electronics and Telecommunication Engineers, India)

JF - IETE Technical Review (Institution of Electronics and Telecommunication Engineers, India)

SN - 0256-4602

IS - 1

ER -