Fully Secure Functional Encryption with General Relations from the Decisional Linear Assumption

نویسندگان

  • Tatsuaki Okamoto
  • Katsuyuki Takashima
چکیده

This paper presents a fully secure functional encryption scheme for a wide class of relations, that are specified by non-monotone access structures combined with inner-product relations. The security is proven under a standard assumption, the decisional linear (DLIN) assumption, in the standard model. The proposed functional encryption scheme covers, as special cases, (1) key-policy, ciphertext-policy and unified-policy (of key and ciphertext policies) attribute-based encryption with non-monotone access structures, and (2) (hierarchical) predicate encryption with inner-product relations and functional encryption with non-zero inner-product relations. ∗An extended abstract was presented at Advances in Cryptology – CRYPTO 2010, LNCS 6223, pages 191-208. This is the full paper.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

An Adaptively Secure Identity-Based Broadcast Encryption using CAST Algorithm

An adaptively secure identity-based broadcast encryption system featuring constant sized ciphertext is introduced. The size of public key and private keys of the system are both linear in the maximum number of receivers. The system is fully collusion-resistant and has stateless receivers. Here, in the system CAST algorithm is used for encryption of the broadcast message. The scheme is well opti...

متن کامل

Fully Secure Doubly-Spatial Encryption under Simple Assumptions

Spatial encryption was first proposed by Boneh and Hamburg in 2008. It is one implementation of the generalized identity-based encryption schemes and many systems with a variety of properties can be derived from it. Recently, Hamburg improved the notion by presenting a variant called doubly-spatial encryption. The doubly-spatial encryption is more powerful and expressive. More useful cryptograp...

متن کامل

Attribute - Hiding ( Hierarchical ) Inner Product Encryption ∗

This paper proposes the first inner product encryption (IPE) scheme that is adaptively secure and fully attribute-hiding (attribute-hiding in the sense of the definition by Katz, Sahai and Waters), while the existing IPE schemes are either fully attribute-hiding but selectively secure or adaptively secure but weakly attribute-hiding. The proposed IPE scheme is proven to be adaptively secure and...

متن کامل

Adaptively Attribute-Hiding (Hierarchical) Inner Product Encryption

This paper proposes the first inner product encryption (IPE) scheme that is adaptively secure and fully attribute-hiding (attributehiding in the sense of the definition by Katz, Sahai and Waters), while the existing IPE schemes are either fully attribute-hiding but selectively secure or adaptively secure but weakly attribute-hiding. The proposed IPE scheme is proven to be adaptively secure and ...

متن کامل

Decentralized Attribute-Based Signatures

We present the first decentralized multi-authority attributebased signature (DMA-ABS) scheme, in which no central authority and no trusted setup are required. The proposed DMA-ABS scheme for a large class of (non-monotone) predicates is fully secure (adaptive-predicate unforgeable and perfectly private) under a standard assumption, the decisional linear (DLIN) assumption, in the random oracle m...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • IACR Cryptology ePrint Archive

دوره 2010  شماره 

صفحات  -

تاریخ انتشار 2010