Hierarchical functional encryption for linear transformations
In contrast to the conventional all-or-nothing encryption, functional encryption (FE) allows partial revelation of encrypted information based on the keys associated with different functionalities. Extending FE with key delegation ability, hierarchical functional encryption (HFE) enables a secret ke...
Saved in:
Main Authors: | , , , |
---|---|
Format: | text |
Language: | English |
Published: |
Institutional Knowledge at Singapore Management University
2017
|
Subjects: | |
Online Access: | https://ink.library.smu.edu.sg/sis_research/7368 https://ink.library.smu.edu.sg/context/sis_research/article/8371/viewcontent/Hierarchical_functional_encryption_for_linear_transformations.pdf |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Singapore Management University |
Language: | English |
id |
sg-smu-ink.sis_research-8371 |
---|---|
record_format |
dspace |
spelling |
sg-smu-ink.sis_research-83712022-10-13T07:48:20Z Hierarchical functional encryption for linear transformations ZHANG, Shiwei MU, Yi YANG, Guomin WANG, Xiaofen In contrast to the conventional all-or-nothing encryption, functional encryption (FE) allows partial revelation of encrypted information based on the keys associated with different functionalities. Extending FE with key delegation ability, hierarchical functional encryption (HFE) enables a secret key holder to delegate a portion of its decryption ability to others and the delegation can be done hierarchically. All HFE schemes in the literature are for general functionalities and not very practical. In this paper, we focus on the functionality of linear transformations (i.e. matrix product evaluation). We refine the definition of HFE and further extend the delegation to accept multiple keys. We also propose a generic HFE construction for linear transformations with IND-CPA security in the standard model from hash proof systems. In addition, we give two instantiations from the DDH and DCR assumptions which to the best of our knowledge are the first practical concrete HFE constructions. 2017-07-01T07:00:00Z text application/pdf https://ink.library.smu.edu.sg/sis_research/7368 info:doi/10.1007/978-3-319-60055-0_2 https://ink.library.smu.edu.sg/context/sis_research/article/8371/viewcontent/Hierarchical_functional_encryption_for_linear_transformations.pdf http://creativecommons.org/licenses/by-nc-nd/4.0/ Research Collection School Of Computing and Information Systems eng Institutional Knowledge at Singapore Management University Functional encryption Hash proof system Hierarchical Matrix product Information Security |
institution |
Singapore Management University |
building |
SMU Libraries |
continent |
Asia |
country |
Singapore Singapore |
content_provider |
SMU Libraries |
collection |
InK@SMU |
language |
English |
topic |
Functional encryption Hash proof system Hierarchical Matrix product Information Security |
spellingShingle |
Functional encryption Hash proof system Hierarchical Matrix product Information Security ZHANG, Shiwei MU, Yi YANG, Guomin WANG, Xiaofen Hierarchical functional encryption for linear transformations |
description |
In contrast to the conventional all-or-nothing encryption, functional encryption (FE) allows partial revelation of encrypted information based on the keys associated with different functionalities. Extending FE with key delegation ability, hierarchical functional encryption (HFE) enables a secret key holder to delegate a portion of its decryption ability to others and the delegation can be done hierarchically. All HFE schemes in the literature are for general functionalities and not very practical. In this paper, we focus on the functionality of linear transformations (i.e. matrix product evaluation). We refine the definition of HFE and further extend the delegation to accept multiple keys. We also propose a generic HFE construction for linear transformations with IND-CPA security in the standard model from hash proof systems. In addition, we give two instantiations from the DDH and DCR assumptions which to the best of our knowledge are the first practical concrete HFE constructions. |
format |
text |
author |
ZHANG, Shiwei MU, Yi YANG, Guomin WANG, Xiaofen |
author_facet |
ZHANG, Shiwei MU, Yi YANG, Guomin WANG, Xiaofen |
author_sort |
ZHANG, Shiwei |
title |
Hierarchical functional encryption for linear transformations |
title_short |
Hierarchical functional encryption for linear transformations |
title_full |
Hierarchical functional encryption for linear transformations |
title_fullStr |
Hierarchical functional encryption for linear transformations |
title_full_unstemmed |
Hierarchical functional encryption for linear transformations |
title_sort |
hierarchical functional encryption for linear transformations |
publisher |
Institutional Knowledge at Singapore Management University |
publishDate |
2017 |
url |
https://ink.library.smu.edu.sg/sis_research/7368 https://ink.library.smu.edu.sg/context/sis_research/article/8371/viewcontent/Hierarchical_functional_encryption_for_linear_transformations.pdf |
_version_ |
1770576320462323712 |