Fully Secure Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner Product Encryption

Fully Secure Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner Product Encryption

2010 | Allison Lewko1,*, Tatsuaki Okamoto2, Amit Sahai3,**, Katsuyuki Takashima4, and Brent Waters5,***
This paper presents two fully secure functional encryption schemes: a fully secure attribute-based encryption (ABE) scheme and a fully secure (attribute-hiding) predicate encryption (PE) scheme for inner-product predicates. Both schemes adapt the dual system encryption methodology introduced by Waters, which is a powerful tool for achieving full security in systems with advanced functionalities. The ABE scheme is constructed in composite order bilinear groups and proven secure from three static assumptions, supporting arbitrary monotone access formulas. The PE scheme is constructed using a new approach based on dual pairing vector spaces, achieving adaptively attribute-hiding security under a non-interactive assumption. The paper also establishes a hierarchical delegation functionality on the proposed PE scheme, providing the first anonymous hierarchical identity-based encryption (HIBE) scheme in the standard model. The techniques used in this paper are versatile and can be adapted to other functional encryption schemes, such as key-policy ABE (KP-ABE).This paper presents two fully secure functional encryption schemes: a fully secure attribute-based encryption (ABE) scheme and a fully secure (attribute-hiding) predicate encryption (PE) scheme for inner-product predicates. Both schemes adapt the dual system encryption methodology introduced by Waters, which is a powerful tool for achieving full security in systems with advanced functionalities. The ABE scheme is constructed in composite order bilinear groups and proven secure from three static assumptions, supporting arbitrary monotone access formulas. The PE scheme is constructed using a new approach based on dual pairing vector spaces, achieving adaptively attribute-hiding security under a non-interactive assumption. The paper also establishes a hierarchical delegation functionality on the proposed PE scheme, providing the first anonymous hierarchical identity-based encryption (HIBE) scheme in the standard model. The techniques used in this paper are versatile and can be adapted to other functional encryption schemes, such as key-policy ABE (KP-ABE).
Reach us at info@study.space
Understanding Fully Secure Functional Encryption%3A Attribute-Based Encryption and (Hierarchical) Inner Product Encryption