2010
DOI: 10.1007/978-3-642-13190-5_4
|View full text |Cite
|
Sign up to set email alerts
|

Fully Secure Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner Product Encryption

Abstract: Abstract. We present two fully secure functional encryption schemes: a fully secure attribute-based encryption (ABE) scheme and a fully secure (attribute-hiding) predicate encryption (PE) scheme for inner-product predicates. In both cases, previous constructions were only proven to be selectively secure. Both results use novel strategies to adapt the dual system encryption methodology introduced by Waters. We construct our ABE scheme in composite order bilinear groups, and prove its security from three static … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

3
827
0
9

Year Published

2012
2012
2024
2024

Publication Types

Select...
4
2
1

Relationship

1
6

Authors

Journals

citations
Cited by 956 publications
(839 citation statements)
references
References 43 publications
3
827
0
9
Order By: Relevance
“…We note that some composite order systems employing dual system encryption, such as the attribute-based encryption scheme in [25], already have analogs in prime order groups proven secure from DLIN using dual pairing vector spaces. In [33], Okamoto and Takashima provide a functional encryption scheme in prime order bilinear groups that is proven fully secure under DLIN.…”
Section: Introductionmentioning
confidence: 99%
See 3 more Smart Citations
“…We note that some composite order systems employing dual system encryption, such as the attribute-based encryption scheme in [25], already have analogs in prime order groups proven secure from DLIN using dual pairing vector spaces. In [33], Okamoto and Takashima provide a functional encryption scheme in prime order bilinear groups that is proven fully secure under DLIN.…”
Section: Introductionmentioning
confidence: 99%
“…For example, the systems presented in [27,25,29,28,26] provide diverse and advanced functionalities like identity-based encryption (IBE), hierarchical identity-based encryption (HIBE), and attribute-based encryption with strong security guarantees (e.g. full security, leakage-resilience) proven from static assumptions.…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations
“…The DBDH assumption is extremely appealing in its simplicity: the assumption is simple to state, the ensuing schemes as well as the proof of security are typically extremely simple too; these schemes have also been standardized [8]. Furthermore, we continue to draw on the techniques developed in these early works: the development of lattice-based (hierarchical) identitybased encryption ((H)IBE) schemes in [11,1,2] parallel corresponding DBDH-based schemes in [10,4,20] and the simplest instantiations of the dual system encryption framework in [16,17] proceed by "embedding" prior DBDH-based schemes into composite-order groups. The fundamental role that the DBDH assumption plays in functional encryption motivates us to understand the limitations on the functionalities that we can realize from the DBDH assumption: namely,…”
Section: Introductionmentioning
confidence: 99%