2013
DOI: 10.9723/jksiis.2013.18.3.017
|View full text |Cite
|
Sign up to set email alerts
|

Universal Composability Notion for Functional Encryption Schemes

Abstract: We have developed an ideal functionality for security requirement of functional encryption schemes. The functionality is needed when we want to show the security of a functional encryption scheme in universal composable (UC) framework. A functionality   was developed to represent ideal respond of a functional encryption scheme against any polynomial time active attacker. We show that UC security notion of functional encryption scheme   is as strong as fully secure functional encryption in an indistinguis… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2014
2014
2015
2015

Publication Types

Select...
1
1

Relationship

1
1

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 18 publications
(15 reference statements)
0
1
0
Order By: Relevance
“…Once the trusted server compromised, then the access control mechanism was also compromised. In general, an ABAC mechanism usually deploys a symmetric and a public cryptographic schemes to reduce the role of a trusted server [3,4]. However, any public cryptography schemes only support one-to-one relation between a secret key and a ciphertext which is not compliance with the nature of ABAC model.…”
Section: Introduction 1)mentioning
confidence: 99%
“…Once the trusted server compromised, then the access control mechanism was also compromised. In general, an ABAC mechanism usually deploys a symmetric and a public cryptographic schemes to reduce the role of a trusted server [3,4]. However, any public cryptography schemes only support one-to-one relation between a secret key and a ciphertext which is not compliance with the nature of ABAC model.…”
Section: Introduction 1)mentioning
confidence: 99%