Browse > Article
http://dx.doi.org/10.9723/jksiis.2013.18.3.017

Universal Composability Notion for Functional Encryption Schemes  

Sadikin, Rifki (School of Electrical Engineering and Computer Science, Kyungpook National University)
Park, YoungHo (Department of Electronics Engineering, Kyungpook National University)
Park, KilHoum (School of Electronics Engineering, Kyungpook National University)
Moon, SangJae (School of Electronics Engineering, Kyungpook National University)
Publication Information
Journal of Korea Society of Industrial Information Systems / v.18, no.3, 2013 , pp. 17-26 More about this Journal
Abstract
We have developed an ideal functionality for security requirement of functional encryption schemes. The functionality is needed when we want to show the security of a functional encryption scheme in universal composable (UC) framework. A functionality $F_{fe}$ was developed to represent ideal respond of a functional encryption scheme against any polynomial time active attacker. We show that UC security notion of functional encryption scheme $F_{fe}$ is as strong as fully secure functional encryption in an indistinguishable game with chosen cipher text attack. The proof used a method that showing for any environment algorithm, it can not distinguish ideal world where the attacker play with ideal functionality $F_{fe}$ and real world where the attacker play a fully secure functional encryption scheme.
Keywords
universal composable framework; formal security notion; functional encryption scheme;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Shamir A., "Identity-based cryptosystems and signature schemes", Proceedings of CRYPTO 84 on Advances in cryptology, pp.47-53, Springer Verlag, 1985.
2 Boneh D. and Franklin M., "Identity-Based Encryption from the Weil Pairing", SIAM Journal of Computing, vol 32, no 3, pp. 586-615, 2003.   DOI   ScienceOn
3 Gentry C., "Practical identity-based encryption without random oracle", Proceedings of the 24th annual international conference on The Theory and Applications of Cryptographic Techniques, pp. 445-464, St. Petersburg, Russia, 2006.
4 Sahai A. and Waters B., "Fuzzy identity-based encryption". EUROCRYPT, Lecture Notes in Computer Science, Vol. 3949, pp. 457-473, Springer, 2005.
5 Baek J., Susilo W. and Zhou J., "New constructions of fuzzy identity based encryption". In Proceedings of the 2nd ACM symposium on information, computer, and communications security, pp. 369-370, 2007.
6 Katz J., Sahai A. and Waters B., "Predicate encryption supporting disjunctions, polynomial equations, and inner products", Proceedings of the theory and applications of cryptographic techniques 27th annual international conference on Advances in cryptology, Istanbul, Turkey, pp. 146-162, 2008.
7 Okamoto, T. and Takahima, K., "Adaptively-Hiding (Hierarchical) Inner Product Encryption", Advances in Cryptology EUROCRYPT 2012-LNCS, vol. 7273, 2012.
8 Bethencourt, J., Sahai, A., Waters, B., "Ciphertext-Policy Attribute-Based Encryption," IEEE Symposium on Security and Privacy, pp. 321-334, 2007.
9 Goyal V., Pandey O., and Sahai A., "Attribute-based encryption for fine-grained access control of encrypted data", Proceedings of the 13th ACM conference on Computer and communications security, pp. 89-98, 2006.
10 Lewko, A., Okamoto, T., Sahai, A., Takashima, K., and Waters, B., "Fully Secure Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner Product Encryption", Advances in Cryptology - EUROCRYPT 2010 LNCS, vol. 6110, pp. 62-91, 2010.
11 Li F., Khan M. K., "A biometric identity-based signcryption scheme", Future Generation Computer Systems, vol. 28, no. 1, pp. 306-310, 2012.   DOI   ScienceOn
12 Dijiang H., and Mayank V., ASPE: attributebased secure policy enforcement in vehicular ad hoc networks, Ad Hoc Networks, vol. 7, no. 8, pp. 1526-1535, 2009.   DOI   ScienceOn
13 Guojun W., Qin L., Jie W., and Minyi G, Hierarchical attribute-based encryption and scalable user revocation for sharing data in cloud servers, Computers & Security, vol. 30, no. 5, pp. 320-331, 2011.   DOI   ScienceOn
14 Boneh D., Sahai A., and Waters B., "Functional encryption: definition and challenges", Theory of Cryptography Lecture Notes in Computer Science, vol. 6597, pp. 253-273, 2011.
15 Nishimaki R., Manabe Y., and Okamoto T., "Universally composable identity-based encryption", IEICE Trans. Fundamental Communication Computer Science, vol. E91-A, no. 1, pp. 262-271, 2008.   DOI   ScienceOn
16 Canetti, R., "Universally composable security: a new paradigm for cryptographic protocols," Foundations of Computer Science, Proceedings. 42nd IEEE Symposium on , pp. 136-145, 2001.
17 Canetti, Ran and Krawczyk, Hugo, "Universally Composable Notions of Key Exchange and Secure Channels", Advances in Cryptology - EUROCRYPT 2002 LNCS, vol. 2332, pp. 337-351, 2002.