Fully secure functional encryption: Attribute-based encryption and (hierarchical) inner product encryption

Allison Lewko*, Tatsuaki Okamoto, Amit Sahai, Katsuyuki Takashima, Brent Waters

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contribution

969 Citations (Scopus)

Abstract

We present two fully secure functional encryption schemes: a fully secure attribute-based encryption (ABE) scheme and a fully secure (attribute-hiding) predicate encryption (PE) scheme for inner-product predicates. In both cases, previous constructions were only proven to be selectively secure. Both results use novel strategies to adapt the dual system encryption methodology introduced by Waters. We construct our ABE scheme in composite order bilinear groups, and prove its security from three static assumptions. Our ABE scheme supports arbitrary monotone access formulas. Our predicate encryption scheme is constructed via a new approach on bilinear pairings using the notion of dual pairing vector spaces proposed by Okamoto and Takashima.

Original languageEnglish
Title of host publicationAdvances in Cryptology - Eurocrypt 2010, 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings
Pages62-91
Number of pages30
DOIs
Publication statusPublished - 2010
Externally publishedYes
Event29th in the Series of EuropeanConferences on the Theory and Application of Cryptographic Techniques, Eurocrypt 2010 - French Riviera, France
Duration: 2010 May 302010 Jun 3

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume6110 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference29th in the Series of EuropeanConferences on the Theory and Application of Cryptographic Techniques, Eurocrypt 2010
Country/TerritoryFrance
CityFrench Riviera
Period10/5/3010/6/3

ASJC Scopus subject areas

  • Theoretical Computer Science
  • Computer Science(all)

Fingerprint

Dive into the research topics of 'Fully secure functional encryption: Attribute-based encryption and (hierarchical) inner product encryption'. Together they form a unique fingerprint.

Cite this