Font Size: a A A

Research On Functional Encryption Scheme And Applications

Posted on:2016-11-20Degree:MasterType:Thesis
Country:ChinaCandidate:C YangFull Text:PDF
GTID:2308330467982356Subject:Applied Mathematics
Abstract/Summary:PDF Full Text Request
With the advent of the age of big data, information security problems are gradually becoming theoptimization problems between information privacy and the efficiency of the informationprocessing. Traditional data encryption schemes which used as ensure information privacy as themain goal, people must decrypt all data that encrypted by traditional data encryption scheme whenprocessing the data. It reduces the direct availability of the data. Fully homomorphic encryptionscheme which presented by Gentry in2009can be directly computing on encrypted data, it does notdecrypt all data before computing the data. However, due to its single decryption key, it cannotprovide permissions for different kinds of information processing.Functional encryption is an ambitious and new encryption scheme first proposed by Boneh et al,in a functional encryption scheme, through the master key it can generate different calculationfunction keys, the function keys holders can directly calculate the encrypted data and get thefunction results. The advantage of this encryption scheme is mainly reflected in: on one hand, thefunction key holders can compute the result directly from the cipher and get the function result(plaintext), it enhances the efficiency of the availability of information in case of the privacy. On theother hand, due to different computing functions corresponding to different keys, it is convenientfor assigning different calculate permissions to different information processors.This paper comprehensively research on the functional encryption and put forward the relatedapplications, the main results are as follows:1This paper introduces several concepts and the research status related to functional encryption,analyses its characteristics and points out the relationship between functional encryption and otherkinds of encryption system. This paper also overviews and analyses the security of functionalencryption.2This paper puts forward a generalization of functional encryption scheme which can be used inoutsourced computation, this paper also gives the security definition of the new scheme. The newscheme used in outsourcing computation can not only ensure the input privacy, operation privacyand output privacy, but also can be verified the outsourcing computation result.3Finally, this paper proposed a secure electronic voting scheme based on the multi-inputfunctional encryption. Compared with the electronic voting scheme based on traditionalcryptography, this scheme can satisfy the several demands of electronic voting at the same time.
Keywords/Search Tags:functional encryption, secure computation, fully homomorphic encryption, ciphercomputable, attribute-based encryption
PDF Full Text Request
Related items