GeoEnc: geometric area based keys and policies in functional encryption systems

  • Authors:
  • Mingwu Zhang;Tsuyoshi Takagi

  • Affiliations:
  • Institute of Mathematics for Industry, Kyushu University, Fukuoka, Japan and College of Informatics, South China Agricultural University, China;Institute of Mathematics for Industry, Kyushu University, Fukuoka, Japan

  • Venue:
  • ACISP'11 Proceedings of the 16th Australasian conference on Information security and privacy
  • Year:
  • 2011

Quantified Score

Hi-index 0.00

Visualization

Abstract

Functional encryption provides more sophisticated and flexible expression between the encryption key ek and decryption key dk by deriving from attribute vectors →x and policy vector →v, respectively. There is a function f(→x,→v) that determines what type of a user with a secret key dk can decrypt the ciphertext encrypted under ek. This allows an encryptor to specify a functional formula as a decryptable policy describing what users can learn from the ciphertext without knowing the decryptor's identities or public keys. In this paper, we explore two geometric-area-based key generation and functional encryption schemes (GeoEnc), where secret keys are associated with a point on a planar coordinate system and encrypt policies are associated with a line (GeoEncLine scheme) or a convex polygon (GeoEncHull scheme). If the attribute point lies on the line or inside the convex hull, the decryption key holder can decrypt the ciphertext associated with the geometric policy such as the line or the convex polygon. The proposed schemes have policy hiding as well as payload hiding characteristics. To the best of our knowledge, they are the first functional encryptions using geometric-area-based keys and policies. We give an evaluation of key distribution in a practical coordinate system and also give a security analysis with a hybrid model. The proposed schemes have many applications as sources for keys generation and policies encryption such as computer graphics security, network topology protection, secure routing and mobile networking, secure multiparty computation, secure GPS/GIS, military area protection, etc.