File Download
Supplementary

postgraduate thesis: Leakage-resilient functional encryption from simple assumptions

TitleLeakage-resilient functional encryption from simple assumptions
Authors
Advisors
Advisor(s):Yiu, SM
Issue Date2020
PublisherThe University of Hong Kong (Pokfulam, Hong Kong)
Citation
Zhang Linru, [張琳茹]. (2020). Leakage-resilient functional encryption from simple assumptions. (Thesis). University of Hong Kong, Pokfulam, Hong Kong SAR.
AbstractI study several problems around leakage-resilient functional encryption schemes from simple assumptions. Roughly speaking, functional encryption was intro- duced to handle the “decryption reveals all-or-nothing” problems in tradi- tional public key encryption, which means that the decryption algorithm of a functional encryption scheme only reveals and outputs a function value of the plaintext. Also, leakage-resilient cryptography was proposed to o↵er formal security guarantees when the adversary can learn some knowledge from the secret values of a cryptographic system. While there are many works on leakage-resilient PKE, IBE and ABE, designing leakage-resilient functional encryption schemes is not easy. I first focus on leakage-resilient inner-product functional encryption (IPFE), and propose a leakage-resilient IPFE scheme in the bounded-retrieval model (BRM) from hash proof system. Then, I consider an important extension of IPFE by enhancing IPFE with identity-based access control such that only users with a pre-defined identity are allowed to do the decryption, and call it identity- based inner-product functional encryption (IBIPFE). I propose an adaptive- secure IBIPFE scheme and extend it into a leakage-resilient IBIPFE scheme in the BRM. The next step after considering inner-product functions (can be viewed as linear functions) is to move to quadratic functions and even higher degree polynomials. I propose a generic adaptive-secure FE scheme for quadratic functions, and then show a transformation method which can obtain a FE scheme for degree-(m + 1) polynomials from a FE scheme for degree-m polynomials.
DegreeDoctor of Philosophy
SubjectData encryption (Computer science)
Dept/ProgramComputer Science
Persistent Identifierhttp://hdl.handle.net/10722/298869

 

DC FieldValueLanguage
dc.contributor.advisorYiu, SM-
dc.contributor.authorZhang Linru-
dc.contributor.author張琳茹-
dc.date.accessioned2021-04-16T11:16:35Z-
dc.date.available2021-04-16T11:16:35Z-
dc.date.issued2020-
dc.identifier.citationZhang Linru, [張琳茹]. (2020). Leakage-resilient functional encryption from simple assumptions. (Thesis). University of Hong Kong, Pokfulam, Hong Kong SAR.-
dc.identifier.urihttp://hdl.handle.net/10722/298869-
dc.description.abstractI study several problems around leakage-resilient functional encryption schemes from simple assumptions. Roughly speaking, functional encryption was intro- duced to handle the “decryption reveals all-or-nothing” problems in tradi- tional public key encryption, which means that the decryption algorithm of a functional encryption scheme only reveals and outputs a function value of the plaintext. Also, leakage-resilient cryptography was proposed to o↵er formal security guarantees when the adversary can learn some knowledge from the secret values of a cryptographic system. While there are many works on leakage-resilient PKE, IBE and ABE, designing leakage-resilient functional encryption schemes is not easy. I first focus on leakage-resilient inner-product functional encryption (IPFE), and propose a leakage-resilient IPFE scheme in the bounded-retrieval model (BRM) from hash proof system. Then, I consider an important extension of IPFE by enhancing IPFE with identity-based access control such that only users with a pre-defined identity are allowed to do the decryption, and call it identity- based inner-product functional encryption (IBIPFE). I propose an adaptive- secure IBIPFE scheme and extend it into a leakage-resilient IBIPFE scheme in the BRM. The next step after considering inner-product functions (can be viewed as linear functions) is to move to quadratic functions and even higher degree polynomials. I propose a generic adaptive-secure FE scheme for quadratic functions, and then show a transformation method which can obtain a FE scheme for degree-(m + 1) polynomials from a FE scheme for degree-m polynomials.-
dc.languageeng-
dc.publisherThe University of Hong Kong (Pokfulam, Hong Kong)-
dc.relation.ispartofHKU Theses Online (HKUTO)-
dc.rightsThe author retains all proprietary rights, (such as patent rights) and the right to use in future works.-
dc.rightsThis work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.-
dc.subject.lcshData encryption (Computer science)-
dc.titleLeakage-resilient functional encryption from simple assumptions-
dc.typePG_Thesis-
dc.description.thesisnameDoctor of Philosophy-
dc.description.thesislevelDoctoral-
dc.description.thesisdisciplineComputer Science-
dc.description.naturepublished_or_final_version-
dc.date.hkucongregation2021-
dc.identifier.mmsid991044360595403414-

Export via OAI-PMH Interface in XML Formats


OR


Export to Other Non-XML Formats