View : 444 Download: 0

Full metadata record

DC Field Value Language
dc.contributor.advisor이향숙-
dc.contributor.author김영서-
dc.creator김영서-
dc.date.accessioned2022-08-04T16:32:44Z-
dc.date.available2022-08-04T16:32:44Z-
dc.date.issued2022-
dc.identifier.otherOAK-000000191471-
dc.identifier.urihttps://dcollection.ewha.ac.kr/common/orgView/000000191471en_US
dc.identifier.urihttps://dspace.ewha.ac.kr/handle/2015.oak/262124-
dc.description.abstractFunctional Encryption is an expanded version of traditional Public Key Encryption. Compared to traditional public-key encryption, functional encryption enables fine-grained access control on encrypted data. It also allows users to learn the function of encrypted data. In this survey paper, we show some mathematical background used in Functional Encryption. Mainly, we demonstrate several Functional Encryption schemes for large three classes. First, we explain IBE and ABE, predicate encryption with public index. Also, we describe predicate encryption with private index and some Functional Encryption beyond predicate encryption. We briefly provide some examples of the three classes and assumptions they use for security. In addition, we describe a complier that transforms public-key single-input functional encryption into multi-client functional encryption for separable function. We demonstrate that this complier satisfies selective security.;Functional Encryption은 기존의 Public-key Encryption과는 다르게 fine-grained access control이 가능한 암호화 시스템을 의미한다. 이 개념은 Boneh, Sahai 그리고 Waters가 [BSW11]에서 처음으로 제안하였다. 복호화 과정에서 원하는 메세지 이외의 다른 정보들은 확인이 불가능하기에 cloud service와 같이 여러 사용자가 사용하는 시스템 안에서 유용하게 사용된다. 본 학위 논문에서는 Functional Encryption scheme을 Predicate Encryption에 기반하여 크게 세가지 class로 나누어서 설명하였다. Predicate Encryption with public index, private index and beyond Predicate Encryption, 각 class에 해당하는 암호 scheme들이 어떤 Predicate를 사용했는지 살펴보고, 어떤 가정 하에 보안이 정의되는지 간략하게 살펴보았다. 또한, separable function을 사용한 pubic-key single-input Functional Encryption에서 Multi-client Functional Encryption으로 변환하는 complier를 제안하였다. 해당 complier는 selective security가 만족함을 보였으며 수정을 통해 adaptive security를 만족할 것으로 기대된다.-
dc.description.tableofcontents1 Introduction 1 2 Preliminaries 4 2.1 Notation 4 2.2 Mathematical Background 5 2.3 Definition of Functional Encryption 6 2.4 Predicate Encryption 9 3 Security 11 3.1 IND-based Security 11 3.2 SIM-based Security 13 4 Predicate encryption system with public index 16 4.1 Identity-Based Encryption 16 4.2 Attribute-Based Encryption 19 4.2.1 Threshold-policy access control 20 4.2.2 Key-policy access control 21 4.2.3 Ciphertext-policy access control 21 5 Predicate encryption system with private index 23 5.1 Anonymous Identity-Based Encryption 23 5.2 Hidden Vector Encryption 24 5.3 Inner-Product Predicate Encryption 25 6 Functional Encryption systems beyond predicates 28 6.1 Inner-Product Encryption 28 6.2 Function-Hiding Inner Product Encryption 29 6.3 Other FE schemes 30 6.3.1 Multi-Input Functional Encryption 30 6.3.2 Multi-Client Functional Encryption 31 6.3.3 FE without single authority 32 7 Experiment 33 8 Conclusion 38 References 39 국문초록 46-
dc.formatapplication/pdf-
dc.format.extent2725259 bytes-
dc.languageeng-
dc.publisher이화여자대학교 대학원-
dc.subject.ddc500-
dc.titleFunctional Encryption-
dc.typeMaster's Thesis-
dc.title.subtitleDefinition by three classes-
dc.format.pageiii, 46 p.-
dc.identifier.thesisdegreeMaster-
dc.identifier.major대학원 수학과-
dc.date.awarded2022. 8-
Appears in Collections:
일반대학원 > 수학과 > Theses_Master
Files in This Item:
There are no files associated with this item.
Export
RIS (EndNote)
XLS (Excel)
XML


qrcode

BROWSE