On the security of functional encryption in the generic group model
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Lee, Hyung Tae | - |
dc.contributor.author | Seo, Jae Hong | - |
dc.date.accessioned | 2023-10-10T02:55:57Z | - |
dc.date.available | 2023-10-10T02:55:57Z | - |
dc.date.created | 2023-06-05 | - |
dc.date.issued | 2023-09 | - |
dc.identifier.issn | 0925-1022 | - |
dc.identifier.uri | https://scholarworks.bwise.kr/hanyang/handle/2021.sw.hanyang/191968 | - |
dc.description.abstract | In the context of functional encryption (FE), a weak security notion called selective security, which enforces the adversary to complete a challenge prior to seeing the system parameters, is used to argue in favor of the security of proposed cryptosystems. These results are often considered as an intermediate step to design adaptively secure cryptosystems. In fact, selectively secure FE schemes play a role of more than an intermediate step in many cases. If we restrict our attention to group-based constructions, it is not surprising to find several selectively secure FE schemes such that no successful adaptive adversary is found yet and/or it is also believed that no adaptive adversary will be found in practice even in the future. In this paper, we aim at clarifying these beliefs rigorously in the ideal model, called generic group model (GGM). First, we refine the definitions of the GGM and the security notions for FE scheme for clarification. Second, we formalize a group-based FE scheme with some conditions and then show that for any group-based FE scheme satisfying these conditions we can reduce from its selective security in the standard model to adaptive security in the GGM, in particular, regardless of the functionality of FE schemes. Our reduction is applicable to many existing selectively secure FE schemes with various functionalities, e.g., the FE scheme for quadratic functions of Baltico et al. (CRYPTO, 2017), the predicate encryption scheme of Katz et al. (J Cryptol in 26:191–224, 2013), and Boneh and Boyen’s identity-based encryption scheme (EUROCRYPT 2004). | - |
dc.language | 영어 | - |
dc.language.iso | en | - |
dc.publisher | SPRINGER | - |
dc.title | On the security of functional encryption in the generic group model | - |
dc.type | Article | - |
dc.contributor.affiliatedAuthor | Seo, Jae Hong | - |
dc.identifier.doi | 10.1007/s10623-023-01237-1 | - |
dc.identifier.scopusid | 2-s2.0-85160407521 | - |
dc.identifier.wosid | 000995396100001 | - |
dc.identifier.bibliographicCitation | DESIGNS CODES AND CRYPTOGRAPHY, v.91, no.9, pp.3081 - 3114 | - |
dc.relation.isPartOf | DESIGNS CODES AND CRYPTOGRAPHY | - |
dc.citation.title | DESIGNS CODES AND CRYPTOGRAPHY | - |
dc.citation.volume | 91 | - |
dc.citation.number | 9 | - |
dc.citation.startPage | 3081 | - |
dc.citation.endPage | 3114 | - |
dc.type.rims | ART | - |
dc.type.docType | Article in press | - |
dc.description.journalClass | 1 | - |
dc.description.isOpenAccess | N | - |
dc.description.journalRegisteredClass | scie | - |
dc.description.journalRegisteredClass | scopus | - |
dc.relation.journalResearchArea | Computer Science | - |
dc.relation.journalResearchArea | Mathematics | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Theory & Methods | - |
dc.relation.journalWebOfScienceCategory | Mathematics, Applied | - |
dc.subject.keywordPlus | IDENTITY-BASED ENCRYPTION | - |
dc.subject.keywordPlus | COMPLEXITY | - |
dc.subject.keywordPlus | FRAMEWORK | - |
dc.subject.keywordAuthor | Generic group model | - |
dc.subject.keywordAuthor | Functional encryption | - |
dc.subject.keywordAuthor | Adaptive security | - |
dc.subject.keywordAuthor | Selective security | - |
dc.subject.keywordAuthor | Group-based | - |
dc.identifier.url | https://link.springer.com/article/10.1007/s10623-023-01237-1 | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
222, Wangsimni-ro, Seongdong-gu, Seoul, 04763, Korea+82-2-2220-1365
COPYRIGHT © 2021 HANYANG UNIVERSITY.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.