Filters








53,018 Hits in 3.9 sec

From Selective to Adaptive Security in Functional Encryption [chapter]

Prabhanjan Ananth, Zvika Brakerski, Gil Segev, Vinod Vaikuntanathan
2015 Lecture Notes in Computer Science  
Starting with a sub-exponential hardness assumption, and taking the security parameter to be polynomial in n allows us to argue that the selectively-secure scheme is in fact also adaptively secure.  ...  Starting with [GGH + 13], there has been significant effort in the research community to construct an adaptively-secure general-purpose functional encryption scheme with an unbounded number of functional  ...  Introduction Our Results: From Selective to Adaptive Security We show that any selectively-secure functional encryption scheme implies an adaptively-secure one, without relying on any additional assumptions  ... 
doi:10.1007/978-3-662-48000-7_32 fatcat:2mrjlpft7rekna5r6pbb4nciam

Lossy Encryption: Constructions from General Assumptions and Efficient Selective Opening Chosen Ciphertext Security [chapter]

Brett Hemenway, Benoît Libert, Rafail Ostrovsky, Damien Vergnaud
2011 Lecture Notes in Computer Science  
Applying our constructions to well-known cryptosystems, we obtain selective opening secure commitments and encryptions from the Decisional Diffie-Hellman, Decisional Composite Residuosity and Quadratic  ...  In a simulation-based definition of chosen-ciphertext selective opening security, we also handle non-adaptive adversaries by adapting the Naor-Yung paradigm and using the perfect zero-knowledge proofs  ...  We thank Yuval Ishai for suggesting a connection between Oblivious Transfer and Lossy Encryption. Brett  ... 
doi:10.1007/978-3-642-25385-0_4 fatcat:3irahugo3jaddm2hgxwbha3dje

Semi-adaptive Security and Bundling Functionalities Made Generic and Easy [chapter]

Rishab Goyal, Venkata Koppula, Brent Waters
2016 Lecture Notes in Computer Science  
Semi-adaptive security is a notion of security that lies between selective and adaptive security for Attribute-Based Encryption (ABE) and Functional Encryption (FE) systems.  ...  The methods used to achieve this result suggest that the moral gap between selective and semi-adaptive security is in general much smaller than that between semi-adaptive and full security.  ...  Selective to Semi-Adaptive Security Generically In this section, we show how to construct semi-adaptively secure functional encryption schemes from selectively secure functional encryption schemes, semantically  ... 
doi:10.1007/978-3-662-53644-5_14 fatcat:k4io2byjxfcxjbs6gwucpl34la

Relations between semantic security and anonymity in identity-based encryption

Javier Herranz, Fabien Laguillaumie, Carla Ràfols
2011 Information Processing Letters  
In this paper we investigate the relations between these selective and adaptive notions, for identity-based encryption schemes enjoying at the same time some security and anonymity properties.  ...  On the positive side, we prove that selective semantic security and adaptive anonymity imply adaptive semantic security.  ...  There exist generic conversions from a selectively secure/anonymous IBE scheme to an adaptively secure/anonymous IBE scheme, either in the random oracle model or when the size of the space of identities  ... 
doi:10.1016/j.ipl.2011.02.002 fatcat:h5puogp2yfaglmjwszn4hy5lqu

Functional Encryption for Inner Product: Achieving Constant-Size Ciphertexts with Adaptive Security or Support for Negation [chapter]

Nuttapong Attrapadung, Benoît Libert
2010 Lecture Notes in Computer Science  
These schemes respectively imply an adaptively secure identity-based broadcast encryption scheme and an identity-based revocation mechanism that both feature short ciphertexts and rely on simple assumptions  ...  In functional encryption (FE) schemes, ciphertexts and private keys are associated with attributes and decryption is possible whenever key and ciphertext attributes are suitably related.  ...  Functional Encryption for Zero Inner-Product Warm-up: Selectively Secure Zero IPE from Spatial Encryption We first show that spatial encryption implies zero IPE.  ... 
doi:10.1007/978-3-642-13013-7_23 fatcat:ronqiut2zfhwtiaedtchvlvxv4

Self-Processing Private Sensor Data via Garbled Encryption

Nathan Manohar, Abhishek Jain, Amit Sahai
2020 Proceedings on Privacy Enhancing Technologies  
Such a system can be used to periodically check, e.g., whether a cluster of servers are in an "alarm" state.We implement our garbled encryption scheme and find that it performs quite well, with function  ...  trusted setup phase, sensors deployed in the field can periodically broadcast encrypted readings of private data that can be computed upon by anyone holding function keys to learn processed output, without  ...  Selectively Secure Garbled Encryption We construct a selectively-secure garbled encryption scheme that supports an unbounded number of ciphertexts in the standard model from one-way functions.  ... 
doi:10.2478/popets-2020-0081 fatcat:bycx35ojm5eibldbabvyoek7pi

Nodal Level Adaptive Security for IOT-Enabled Sensors through Dynamic Reconfigurable Encryption

2019 International Journal of Engineering and Advanced Technology  
In this paper, nodal level security is done through dynamic encryption technique. The advantage of dynamic encryption is achieved by adaptive security.  ...  IOT-enabled sensors have been deployed in the wide area to perform various applications. Information security is an important aspect in wireless sensor networks.  ...  CONCEPT OF ADAPTIVE SECURITY This is needed for a more optimized sensor node to dynamically select the encryption algorithm. For adaptive security, various approaches have been employed earlier.  ... 
doi:10.35940/ijeat.f8738.088619 fatcat:slo2kewvkbhyhii7k2o4vfauja

Single-Key to Multi-Key Functional Encryption with Polynomial Loss [chapter]

Sanjam Garg, Akshayaram Srinivasan
2016 Lecture Notes in Computer Science  
Functional encryption (FE) enables fine-grained access to encrypted data.  ...  In this work, we give a transformation from a FE scheme for which the adversary gets access to a single secret key (with ciphertext size sub-linear in the circuit for which this secret key is issued) to  ...  Our Transformation In this section we describe our transformation from single-key, weakly selective secure functional encryption with fully compact ciphertexts to multi-key, selective secure functional  ... 
doi:10.1007/978-3-662-53644-5_16 fatcat:5sqabxdyovb73k42i5tio43ioi

Hierarchical Functional Encryption

Zvika Brakerski, Nishanth Chandran, Vipul Goyal, Aayush Jain, Amit Sahai, Gil Segev, Marc Herbstritt
2017 Innovations in Theoretical Computer Science  
In addition, even when starting with schemes that are secure against a bounded number of collusions (which are known to exist under rather minimal assumptions such as the existence of public-key encryption  ...  Functional encryption provides fine-grained access control for encrypted data, allowing each user to learn only specific functions of the encrypted data.  ...  In addition to our notion of adaptive security we consider two natural relaxations: semi-adaptive security, and selective security.  ... 
doi:10.4230/lipics.itcs.2017.8 dblp:conf/innovations/BrakerskiCGJSS17 fatcat:y6i64ftilzda5ic6wwqyocclae

Design of Adaptive Security Mechanisms for Real-Time Embedded Systems [chapter]

Mehrdad Saadatmand, Antonio Cicchetti, Mikael Sjödin
2012 Lecture Notes in Computer Science  
in an adaptive way, by monitoring and keeping a log of their behaviors.  ...  To ensure correct design of these systems, it is important to also take into account impacts of security features on other non-functional requirements, such as performance and energy consumption.  ...  Instead, for such systems, an adaptive approach to select appropriate security mechanisms, based on the state of the system, can be used to adapt its behavior at runtime and stay within the timing constraints  ... 
doi:10.1007/978-3-642-28166-2_12 fatcat:rcvqtawxx5bspbrcoihpdy3piy

Universal Composability Notion for Functional Encryption Schemes

Rifki Sadikin, YoungHo Park, KilHoum Park, SangJae Moon
2013 Journal of the Korea Industrial Information Systems Research  
The functionality is needed when we want to show the security of a functional encryption scheme in universal composable (UC) framework.  ...  We show that UC security notion of functional encryption scheme   is as strong as fully secure functional encryption in an indistinguishable game with chosen cipher text attack.  ...  Let    is a functional encryption scheme,   securely realizes the functionality    in a presence of non-adaptive adversary if and only if  is a fully secure functional  ... 
doi:10.9723/jksiis.2013.18.3.017 fatcat:enanmtybgney3cmmmohzt72af4

The Interplay between Compression and Security for Image and Video Communication and Adaptation over Networks

Enrico Magli, Qibin Sun
2007 EURASIP Journal on Information Security  
The six selected papers in this special issue provide an up-to-date picture of state-of-the-art research in the field of compression and security, emphasizing the interplay between these two aspects.  ...  They present a packet body encryption scheme that maintains compliance with the syntax, as well as a scheme that encrypts the packet headers in order to improve security.  ...  in order to improve the security.  ... 
doi:10.1186/1687-417x-2007-019824 fatcat:juzo5olrt5ftphm64knm6kvgyq

The Interplay between Compression and Security for Image and Video Communication and Adaptation over Networks

Enrico Magli, Qibin Sun
2007 EURASIP Journal on Information Security  
The six selected papers in this special issue provide an up-to-date picture of state-of-the-art research in the field of compression and security, emphasizing the interplay between these two aspects.  ...  They present a packet body encryption scheme that maintains compliance with the syntax, as well as a scheme that encrypts the packet headers in order to improve security.  ...  in order to improve the security.  ... 
doi:10.1155/2007/19824 fatcat:kasbppbowvcfpcxmh4sgjr42je

Decentralized Multi-Client Functional Encryption for Inner Product

Jérémy Chotard, Edouard Dufour Sans, Romain Gay, Duong Hieu Phan, David Pointcheval
2018 Zenodo  
We combine technique from Private Stream Aggregation (PSA) and Functional Encryption (FE), to introduce a primitive we call Decentralized Multi-Client Functional Encryption (DMCFE), for which we give a  ...  We prove adaptive security of our constructions, while allowing corruptions of the clients, in the random oracle model.  ...  Acknowledgments This work was supported in part by the European Community's Seventh Framework Programme (FP7/2007-2013 Grant Agreement no. 339563 -CryptoCloud), the European Community's Horizon 2020 Project  ... 
doi:10.5281/zenodo.3406030 fatcat:fhufgcpa2re55ir6y2x5supncm

A New Method of Query over Encrypted Data in Database using Hash Map

Mohammed Alhanjouri, Ayman M. Al Derawi
2012 International Journal of Computer Applications  
In our paper we propose a new mechanism to query the encrypted data beside make a tradeoff between the performance and the security. Our mechanism will work over many data-types.  ...  High secure data in databases is protected by encryption. When the data is encrypted, query performance decreases.  ...  way to secure such data is to encrypt it.  ... 
doi:10.5120/5533-7580 fatcat:34twk2e5zvdzdmhx4fnjl2ycwm
« Previous Showing results 1 — 15 out of 53,018 results