359 0

Full metadata record

DC FieldValueLanguage
dc.contributor.author서재홍-
dc.date.accessioned2020-09-23T06:15:41Z-
dc.date.available2020-09-23T06:15:41Z-
dc.date.issued2019-09-
dc.identifier.citationTHEORETICAL COMPUTER SCIENCE, v. 783, Page. 22-40en_US
dc.identifier.issn0304-3975-
dc.identifier.issn1879-2294-
dc.identifier.urihttps://www.sciencedirect.com/science/article/pii/S0304397519301690?via%3Dihub-
dc.identifier.urihttps://repository.hanyang.ac.kr/handle/20.500.11754/154089-
dc.description.abstractFunctional encryption (FE) is a novel paradigm supporting restricted decryption keys for a function f that allow one to learn f(x(j)) from the encryptions of messages x(j). A natural and practical security requirement for FE is to keep not only messages x(1),..., x(q), but also functions f(1),...f(q), excluding inevitable information {f(i)(x(j))}(i,j is an element of[q]), confidential from encryption and decryption keys for any polynomial a priori unknown number q, where f(i) and x(j) are adaptively chosen by adversaries. This security requirement is called full function privacy. In this paper, we focus on function-private FE for inner product functionality in the private key setting (referred to as inner product encryption (IPE)). To the best of our knowledge, only two approaches have been proposed for fully function-private IPE schemes in the private key setting. One is to employ a general transformation from (non-function-private) FE for general circuits (Brakerski and Segev, 2015 [20]). This approach requires computationally intensive cryptography tools, such as indistinguishability obfuscation (for non-function-private FE for general circuits), meaning it is inefficient. The other approach is more practical. It directly constructs an IPE scheme by using dual-pairing vector spaces (DPVS) (Bishop et al., 2015 [21], Datta et al., 2016 [22], and Tomida et al., 2016 [32]). We present a novel approach for practical function-private IPE schemes that does not employ DPVS, but instead uses generalizations of the Brakerski-Segev transformation. Our generalizations of the Brakerski-Segev transformation are easily combinable with existing (non-function-private) IPE schemes, as well as (non-function-private) FE schemes for general circuits on several levels of security. The proposed IPE scheme achieves better performance compared to the schemes proposed by Bishop et al. and Datta et al. The proposed IPE scheme preserves the same security level as previous schemes under the same complexity assumptions. Compared to the scheme proposed by Tomida et al., our scheme has comparable performance in terms of the size of ciphertext and decryption keys, but superior performance in terms of the size of the master key. (C) 2019 Elsevier B.V. All rights reserved.en_US
dc.language.isoenen_US
dc.publisherELSEVIER SCIENCE BVen_US
dc.subjectFunctional encryptionen_US
dc.subjectFunction privacyen_US
dc.subjectInner product encryptionen_US
dc.titleA new approach to practical function-private inner product encryptionen_US
dc.typeArticleen_US
dc.relation.volume783-
dc.identifier.doi10.1016/j.tcs.2019.03.016-
dc.relation.page22-40-
dc.relation.journalTHEORETICAL COMPUTER SCIENCE-
dc.contributor.googleauthorKim, Sungwook-
dc.contributor.googleauthorSungwook, Jinsu-
dc.contributor.googleauthorSeo, Jae Hong-
dc.relation.code2019002154-
dc.sector.campusS-
dc.sector.daehakCOLLEGE OF NATURAL SCIENCES[S]-
dc.sector.departmentDEPARTMENT OF MATHEMATICS-
dc.identifier.pidjaehongseo-
Appears in Collections:
COLLEGE OF NATURAL SCIENCES[S](자연과학대학) > MATHEMATICS(수학과) > Articles
Files in This Item:
There are no files associated with this item.
Export
RIS (EndNote)
XLS (Excel)
XML


qrcode

Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.

BROWSE