Recent topics on practical functional encryption

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

In a traditional public key encryption system, data is encrypted to a particular individual who is fixed by a public key, and the revealed information is all-or-nothing. Functional encryption (FE) gives a new way of sharing encrypted data, with fine-grained control over revealed information on encrypted data. In FE, a secret key enables a user to learn a specific function of the encrypted data and nothing else. Attribute-based encryption (ABE) can specify a wide variety of receiver sets by using relation between key and cipher text parameters. This survey for a wide audience will first give the notions of FE, ABE (and attribute-based signatures (ABS)), and describe several practical applications of FE schemes on dual pairing vector spaces (DPVS). The cryptosystems are implemented by using a pairing operation on an elliptic curve, which has achieved many new applications including FE in recent years. We also give a brief summary of the mathematical mechanism, e.g., The algorithm, parameter selection, and underlying security.

Original languageEnglish
Title of host publicationProceedings - 2014 2nd International Symposium on Computing and Networking, CANDAR 2014
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages21-27
Number of pages7
ISBN (Electronic)9781479941520
DOIs
Publication statusPublished - 2014
Externally publishedYes
Event2nd International Symposium on Computing and Networking, CANDAR 2014 - Shizuoka, Japan
Duration: 2014 Dec 102014 Dec 12

Publication series

NameProceedings - 2014 2nd International Symposium on Computing and Networking, CANDAR 2014

Other

Other2nd International Symposium on Computing and Networking, CANDAR 2014
CountryJapan
CityShizuoka
Period14/12/1014/12/12

Keywords

  • Attribute-based encryption
  • Dual pairing vector spaces
  • Functional encryption
  • Pairing-based cryptography

ASJC Scopus subject areas

  • Computer Networks and Communications

Fingerprint Dive into the research topics of 'Recent topics on practical functional encryption'. Together they form a unique fingerprint.

Cite this