DOI QR코드

DOI QR Code

Universal Composability Notion for Functional Encryption Schemes

  • Sadikin, Rifki (School of Electrical Engineering and Computer Science, Kyungpook National University) ;
  • Park, YoungHo (Department of Electronics Engineering, Kyungpook National University) ;
  • Park, KilHoum (School of Electronics Engineering, Kyungpook National University) ;
  • Moon, SangJae (School of Electronics Engineering, Kyungpook National University)
  • Received : 2013.05.09
  • Accepted : 2013.06.21
  • Published : 2013.06.30

Abstract

We have developed an ideal functionality for security requirement of functional encryption schemes. The functionality is needed when we want to show the security of a functional encryption scheme in universal composable (UC) framework. A functionality $F_{fe}$ was developed to represent ideal respond of a functional encryption scheme against any polynomial time active attacker. We show that UC security notion of functional encryption scheme $F_{fe}$ is as strong as fully secure functional encryption in an indistinguishable game with chosen cipher text attack. The proof used a method that showing for any environment algorithm, it can not distinguish ideal world where the attacker play with ideal functionality $F_{fe}$ and real world where the attacker play a fully secure functional encryption scheme.

Keywords

References

  1. Shamir A., "Identity-based cryptosystems and signature schemes", Proceedings of CRYPTO 84 on Advances in cryptology, pp.47-53, Springer Verlag, 1985.
  2. Boneh D. and Franklin M., "Identity-Based Encryption from the Weil Pairing", SIAM Journal of Computing, vol 32, no 3, pp. 586-615, 2003. https://doi.org/10.1137/S0097539701398521
  3. Gentry C., "Practical identity-based encryption without random oracle", Proceedings of the 24th annual international conference on The Theory and Applications of Cryptographic Techniques, pp. 445-464, St. Petersburg, Russia, 2006.
  4. Sahai A. and Waters B., "Fuzzy identity-based encryption". EUROCRYPT, Lecture Notes in Computer Science, Vol. 3949, pp. 457-473, Springer, 2005.
  5. Baek J., Susilo W. and Zhou J., "New constructions of fuzzy identity based encryption". In Proceedings of the 2nd ACM symposium on information, computer, and communications security, pp. 369-370, 2007.
  6. Katz J., Sahai A. and Waters B., "Predicate encryption supporting disjunctions, polynomial equations, and inner products", Proceedings of the theory and applications of cryptographic techniques 27th annual international conference on Advances in cryptology, Istanbul, Turkey, pp. 146-162, 2008.
  7. Okamoto, T. and Takahima, K., "Adaptively-Hiding (Hierarchical) Inner Product Encryption", Advances in Cryptology EUROCRYPT 2012-LNCS, vol. 7273, 2012.
  8. Bethencourt, J., Sahai, A., Waters, B., "Ciphertext-Policy Attribute-Based Encryption," IEEE Symposium on Security and Privacy, pp. 321-334, 2007.
  9. Goyal V., Pandey O., and Sahai A., "Attribute-based encryption for fine-grained access control of encrypted data", Proceedings of the 13th ACM conference on Computer and communications security, pp. 89-98, 2006.
  10. Lewko, A., Okamoto, T., Sahai, A., Takashima, K., and Waters, B., "Fully Secure Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner Product Encryption", Advances in Cryptology - EUROCRYPT 2010 LNCS, vol. 6110, pp. 62-91, 2010.
  11. Li F., Khan M. K., "A biometric identity-based signcryption scheme", Future Generation Computer Systems, vol. 28, no. 1, pp. 306-310, 2012. https://doi.org/10.1016/j.future.2010.11.004
  12. Dijiang H., and Mayank V., ASPE: attributebased secure policy enforcement in vehicular ad hoc networks, Ad Hoc Networks, vol. 7, no. 8, pp. 1526-1535, 2009. https://doi.org/10.1016/j.adhoc.2009.04.011
  13. Guojun W., Qin L., Jie W., and Minyi G, Hierarchical attribute-based encryption and scalable user revocation for sharing data in cloud servers, Computers & Security, vol. 30, no. 5, pp. 320-331, 2011. https://doi.org/10.1016/j.cose.2011.05.006
  14. Boneh D., Sahai A., and Waters B., "Functional encryption: definition and challenges", Theory of Cryptography Lecture Notes in Computer Science, vol. 6597, pp. 253-273, 2011.
  15. Canetti, R., "Universally composable security: a new paradigm for cryptographic protocols," Foundations of Computer Science, Proceedings. 42nd IEEE Symposium on , pp. 136-145, 2001.
  16. Canetti, Ran and Krawczyk, Hugo, "Universally Composable Notions of Key Exchange and Secure Channels", Advances in Cryptology - EUROCRYPT 2002 LNCS, vol. 2332, pp. 337-351, 2002.
  17. Nishimaki R., Manabe Y., and Okamoto T., "Universally composable identity-based encryption", IEICE Trans. Fundamental Communication Computer Science, vol. E91-A, no. 1, pp. 262-271, 2008. https://doi.org/10.1093/ietfec/e91-a.1.262

Cited by

  1. Secure Attribute-Based Access Control with a Ciphertext-Policy Attribute-Based Encryption Scheme vol.19, pp.1, 2014, https://doi.org/10.9723/jksiis.2014.19.1.001