From Weakly Selective to Selective Security in Compact Functional Encryption

نویسنده

  • Linfeng Zhou
چکیده

We provide a generic transformation from weakly selective secure FE to selective secure FE through an approach called hybrid functional key generation. Furthermore, our transformation preserves the compactness of the FE scheme. Additionally, we note that this transformation is much simpler than the prior work [GS16]. We consider the simplicity of the construction in this work as a positive feature and the hybrid functional key generation approach as a new method that can be applied in functional encryption schemes. Furthermore, we try to weaken the input FE scheme of our transformation to be a non-compact one instead of a fully-compact one, by additionally assuming the hardness of LWE (or Ring-LWE) assumption. We achieve this result by utilizing the FE scheme for bounded collusions with decomposable and succinct ciphertext property, which can be solely based on the LWE (or Ring-LWE) assumption. Finally we present the implications of our result, which improves previous results, in building general-purpose indistinguishability obfuscator from (well-expressed) functional encryption.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Unifying Security Notions of Functional Encryption

Functional Encryption (FE) generalizes the notion of traditional encryption system by providing fine-grained access to data. In a FE scheme, the holder of a secret key SKf (associated with a function f) and a ciphertext c (encrypting plaintext x) can learn f(x) but nothing else. The indistinguishability (IND) based security notion of FE can be parameterized based on whether the adversary obtain...

متن کامل

Indistinguishability Obfuscation from Compact Functional Encryption

The arrival of indistinguishability obfuscation (iO) has transformed the cryptographic landscape by enabling several security goals that were previously beyond our reach. Consequently, one of the pressing goals currently is to construct iO from well-studied standard cryptographic assumptions. In this work, we make progress in this direction by presenting a reduction from iO to a natural form of...

متن کامل

New Proof Methods for Attribute-Based Encryption: Achieving Full Security through Selective Techniques

We develop a new methodology for utilizing the prior techniques to prove selective security for functional encryption systems as a direct ingredient in devising proofs of full security. This deepens the relationship between the selective and full security models and provides a path for transferring the best qualities of selectively secure systems to fully secure systems. In particular, we prese...

متن کامل

Dual System Encryption via Doubly Selective Security: Framework, Fully Secure Functional Encryption for Regular Languages, and More

Dual system encryption techniques introduced by Waters in Crypto’09 are powerful approaches for constructing fully secure functional encryption (FE) for many predicates. However, there are still some FE for certain predicates to which dual system encryption techniques seem inapplicable, and hence their fully-secure realization remains an important problem. A notable example is FE for regular la...

متن کامل

Novel Selective Video Encryption for H.264 Video

: Internet video services has widespread application in areas such as digital television, mobile TV, videoconferencing and video on demand. Once a video stream goes beyond simple public communications, then various factors have to be considered. One important factor to consider is that data security. Selective Video Encryption has evolved in past few years because they need less time and ensure...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • IACR Cryptology ePrint Archive

دوره 2016  شماره 

صفحات  -

تاریخ انتشار 2016