File Download
Supplementary
-
Citations:
- Appears in Collections:
postgraduate thesis: Leakage-resilient functional encryption from simple assumptions
Title | Leakage-resilient functional encryption from simple assumptions |
---|---|
Authors | |
Advisors | Advisor(s):Yiu, SM |
Issue Date | 2020 |
Publisher | The University of Hong Kong (Pokfulam, Hong Kong) |
Citation | Zhang Linru, [張琳茹]. (2020). Leakage-resilient functional encryption from simple assumptions. (Thesis). University of Hong Kong, Pokfulam, Hong Kong SAR. |
Abstract | I study several problems around leakage-resilient functional encryption schemes from simple assumptions. Roughly speaking, functional encryption was intro- duced to handle the “decryption reveals all-or-nothing” problems in tradi- tional public key encryption, which means that the decryption algorithm of a functional encryption scheme only reveals and outputs a function value of the plaintext. Also, leakage-resilient cryptography was proposed to o↵er formal security guarantees when the adversary can learn some knowledge from the secret values of a cryptographic system.
While there are many works on leakage-resilient PKE, IBE and ABE, designing leakage-resilient functional encryption schemes is not easy. I first focus on leakage-resilient inner-product functional encryption (IPFE), and propose a leakage-resilient IPFE scheme in the bounded-retrieval model (BRM) from hash proof system. Then, I consider an important extension of IPFE by enhancing IPFE with identity-based access control such that only users with a pre-defined identity are allowed to do the decryption, and call it identity- based inner-product functional encryption (IBIPFE). I propose an adaptive- secure IBIPFE scheme and extend it into a leakage-resilient IBIPFE scheme in the BRM. The next step after considering inner-product functions (can be viewed as linear functions) is to move to quadratic functions and even higher degree polynomials. I propose a generic adaptive-secure FE scheme for quadratic functions, and then show a transformation method which can obtain a FE scheme for degree-(m + 1) polynomials from a FE scheme for degree-m polynomials. |
Degree | Doctor of Philosophy |
Subject | Data encryption (Computer science) |
Dept/Program | Computer Science |
Persistent Identifier | http://hdl.handle.net/10722/298869 |
DC Field | Value | Language |
---|---|---|
dc.contributor.advisor | Yiu, SM | - |
dc.contributor.author | Zhang Linru | - |
dc.contributor.author | 張琳茹 | - |
dc.date.accessioned | 2021-04-16T11:16:35Z | - |
dc.date.available | 2021-04-16T11:16:35Z | - |
dc.date.issued | 2020 | - |
dc.identifier.citation | Zhang Linru, [張琳茹]. (2020). Leakage-resilient functional encryption from simple assumptions. (Thesis). University of Hong Kong, Pokfulam, Hong Kong SAR. | - |
dc.identifier.uri | http://hdl.handle.net/10722/298869 | - |
dc.description.abstract | I study several problems around leakage-resilient functional encryption schemes from simple assumptions. Roughly speaking, functional encryption was intro- duced to handle the “decryption reveals all-or-nothing” problems in tradi- tional public key encryption, which means that the decryption algorithm of a functional encryption scheme only reveals and outputs a function value of the plaintext. Also, leakage-resilient cryptography was proposed to o↵er formal security guarantees when the adversary can learn some knowledge from the secret values of a cryptographic system. While there are many works on leakage-resilient PKE, IBE and ABE, designing leakage-resilient functional encryption schemes is not easy. I first focus on leakage-resilient inner-product functional encryption (IPFE), and propose a leakage-resilient IPFE scheme in the bounded-retrieval model (BRM) from hash proof system. Then, I consider an important extension of IPFE by enhancing IPFE with identity-based access control such that only users with a pre-defined identity are allowed to do the decryption, and call it identity- based inner-product functional encryption (IBIPFE). I propose an adaptive- secure IBIPFE scheme and extend it into a leakage-resilient IBIPFE scheme in the BRM. The next step after considering inner-product functions (can be viewed as linear functions) is to move to quadratic functions and even higher degree polynomials. I propose a generic adaptive-secure FE scheme for quadratic functions, and then show a transformation method which can obtain a FE scheme for degree-(m + 1) polynomials from a FE scheme for degree-m polynomials. | - |
dc.language | eng | - |
dc.publisher | The University of Hong Kong (Pokfulam, Hong Kong) | - |
dc.relation.ispartof | HKU Theses Online (HKUTO) | - |
dc.rights | The author retains all proprietary rights, (such as patent rights) and the right to use in future works. | - |
dc.rights | This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License. | - |
dc.subject.lcsh | Data encryption (Computer science) | - |
dc.title | Leakage-resilient functional encryption from simple assumptions | - |
dc.type | PG_Thesis | - |
dc.description.thesisname | Doctor of Philosophy | - |
dc.description.thesislevel | Doctoral | - |
dc.description.thesisdiscipline | Computer Science | - |
dc.description.nature | published_or_final_version | - |
dc.date.hkucongregation | 2021 | - |
dc.identifier.mmsid | 991044360595403414 | - |