Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

On the security of functional encryption in the generic group model

Full metadata record
DC Field Value Language
dc.contributor.authorLee, Hyung Tae-
dc.contributor.authorSeo, Jae Hong-
dc.date.accessioned2023-10-10T02:55:57Z-
dc.date.available2023-10-10T02:55:57Z-
dc.date.created2023-06-05-
dc.date.issued2023-09-
dc.identifier.issn0925-1022-
dc.identifier.urihttps://scholarworks.bwise.kr/hanyang/handle/2021.sw.hanyang/191968-
dc.description.abstractIn the context of functional encryption (FE), a weak security notion called selective security, which enforces the adversary to complete a challenge prior to seeing the system parameters, is used to argue in favor of the security of proposed cryptosystems. These results are often considered as an intermediate step to design adaptively secure cryptosystems. In fact, selectively secure FE schemes play a role of more than an intermediate step in many cases. If we restrict our attention to group-based constructions, it is not surprising to find several selectively secure FE schemes such that no successful adaptive adversary is found yet and/or it is also believed that no adaptive adversary will be found in practice even in the future. In this paper, we aim at clarifying these beliefs rigorously in the ideal model, called generic group model (GGM). First, we refine the definitions of the GGM and the security notions for FE scheme for clarification. Second, we formalize a group-based FE scheme with some conditions and then show that for any group-based FE scheme satisfying these conditions we can reduce from its selective security in the standard model to adaptive security in the GGM, in particular, regardless of the functionality of FE schemes. Our reduction is applicable to many existing selectively secure FE schemes with various functionalities, e.g., the FE scheme for quadratic functions of Baltico et al. (CRYPTO, 2017), the predicate encryption scheme of Katz et al. (J Cryptol in 26:191–224, 2013), and Boneh and Boyen’s identity-based encryption scheme (EUROCRYPT 2004).-
dc.language영어-
dc.language.isoen-
dc.publisherSPRINGER-
dc.titleOn the security of functional encryption in the generic group model-
dc.typeArticle-
dc.contributor.affiliatedAuthorSeo, Jae Hong-
dc.identifier.doi10.1007/s10623-023-01237-1-
dc.identifier.scopusid2-s2.0-85160407521-
dc.identifier.wosid000995396100001-
dc.identifier.bibliographicCitationDESIGNS CODES AND CRYPTOGRAPHY, v.91, no.9, pp.3081 - 3114-
dc.relation.isPartOfDESIGNS CODES AND CRYPTOGRAPHY-
dc.citation.titleDESIGNS CODES AND CRYPTOGRAPHY-
dc.citation.volume91-
dc.citation.number9-
dc.citation.startPage3081-
dc.citation.endPage3114-
dc.type.rimsART-
dc.type.docTypeArticle in press-
dc.description.journalClass1-
dc.description.isOpenAccessN-
dc.description.journalRegisteredClassscie-
dc.description.journalRegisteredClassscopus-
dc.relation.journalResearchAreaComputer Science-
dc.relation.journalResearchAreaMathematics-
dc.relation.journalWebOfScienceCategoryComputer Science, Theory & Methods-
dc.relation.journalWebOfScienceCategoryMathematics, Applied-
dc.subject.keywordPlusIDENTITY-BASED ENCRYPTION-
dc.subject.keywordPlusCOMPLEXITY-
dc.subject.keywordPlusFRAMEWORK-
dc.subject.keywordAuthorGeneric group model-
dc.subject.keywordAuthorFunctional encryption-
dc.subject.keywordAuthorAdaptive security-
dc.subject.keywordAuthorSelective security-
dc.subject.keywordAuthorGroup-based-
dc.identifier.urlhttps://link.springer.com/article/10.1007/s10623-023-01237-1-
Files in This Item
Go to Link
Appears in
Collections
서울 자연과학대학 > 서울 수학과 > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher Seo, Jae Hong photo

Seo, Jae Hong
COLLEGE OF NATURAL SCIENCES (DEPARTMENT OF MATHEMATICS)
Read more

Altmetrics

Total Views & Downloads

BROWSE