TY - GEN
T1 - Recent topics on practical functional encryption
AU - Takashima, Katsuyuki
N1 - Publisher Copyright:
© 2014 IEEE.
PY - 2014
Y1 - 2014
N2 - In a traditional public key encryption system, data is encrypted to a particular individual who is fixed by a public key, and the revealed information is all-or-nothing. Functional encryption (FE) gives a new way of sharing encrypted data, with fine-grained control over revealed information on encrypted data. In FE, a secret key enables a user to learn a specific function of the encrypted data and nothing else. Attribute-based encryption (ABE) can specify a wide variety of receiver sets by using relation between key and cipher text parameters. This survey for a wide audience will first give the notions of FE, ABE (and attribute-based signatures (ABS)), and describe several practical applications of FE schemes on dual pairing vector spaces (DPVS). The cryptosystems are implemented by using a pairing operation on an elliptic curve, which has achieved many new applications including FE in recent years. We also give a brief summary of the mathematical mechanism, e.g., The algorithm, parameter selection, and underlying security.
AB - In a traditional public key encryption system, data is encrypted to a particular individual who is fixed by a public key, and the revealed information is all-or-nothing. Functional encryption (FE) gives a new way of sharing encrypted data, with fine-grained control over revealed information on encrypted data. In FE, a secret key enables a user to learn a specific function of the encrypted data and nothing else. Attribute-based encryption (ABE) can specify a wide variety of receiver sets by using relation between key and cipher text parameters. This survey for a wide audience will first give the notions of FE, ABE (and attribute-based signatures (ABS)), and describe several practical applications of FE schemes on dual pairing vector spaces (DPVS). The cryptosystems are implemented by using a pairing operation on an elliptic curve, which has achieved many new applications including FE in recent years. We also give a brief summary of the mathematical mechanism, e.g., The algorithm, parameter selection, and underlying security.
KW - Attribute-based encryption
KW - Dual pairing vector spaces
KW - Functional encryption
KW - Pairing-based cryptography
UR - http://www.scopus.com/inward/record.url?scp=84988234029&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84988234029&partnerID=8YFLogxK
U2 - 10.1109/CANDAR.2014.94
DO - 10.1109/CANDAR.2014.94
M3 - Conference contribution
AN - SCOPUS:84988234029
T3 - Proceedings - 2014 2nd International Symposium on Computing and Networking, CANDAR 2014
SP - 21
EP - 27
BT - Proceedings - 2014 2nd International Symposium on Computing and Networking, CANDAR 2014
PB - Institute of Electrical and Electronics Engineers Inc.
T2 - 2nd International Symposium on Computing and Networking, CANDAR 2014
Y2 - 10 December 2014 through 12 December 2014
ER -