Functional Encryption: A New Vision for Public-Key Cryptography

被引:70
作者
Boneh, Dan [1 ]
Sahai, Amit [2 ]
Waters, Brent [3 ]
机构
[1] Stanford Univ, Stanford, CA 94305 USA
[2] Univ Calif Los Angeles, Los Angeles, CA USA
[3] Univ Texas Austin, Austin, TX 78712 USA
基金
美国国家科学基金会;
关键词
IDENTITY-BASED ENCRYPTION;
D O I
10.1145/2366316.2366333
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
ENCRYPTION IS A method for users to securely share data over an insecure network or storage server. Before the advent of public-key cryptography, a widely held view was that for two users to communicate data confidentially they would have to first establish a mutually held secret key k. While acceptable, perhaps, for some small or tight-knit organizations, such a solution is clearly infeasible for larger networks (such as today's Internet). More than 30 years ago, Diffie and Hellman(11,12) introduced the concept of public-key cryptography, where two parties securely communicate with each other without having a prior mutual secret, radically challenging the conventional wisdom of the time.
引用
收藏
页码:56 / 64
页数:9
相关论文
共 33 条
[1]  
Agrawal S, 2011, LECT NOTES COMPUT SC, V7073, P21, DOI 10.1007/978-3-642-25385-0_2
[2]  
Agrawal S, 2010, LECT NOTES COMPUT SC, V6110, P553
[3]   Ciphertext-policy attribute-based encryption [J].
Bethencourt, John ;
Sahai, Amit ;
Waters, Brent .
2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, :321-+
[4]  
Boneh D, 2004, LECT NOTES COMPUT SC, V3027, P506
[5]  
Boneh D, 2004, LECT NOTES COMPUT SC, V3027, P223
[6]   Identity-based encryption from the Weil pairing [J].
Boneh, D ;
Franklin, M .
SIAM JOURNAL ON COMPUTING, 2003, 32 (03) :586-615
[7]  
Boneh D, 2007, LECT NOTES COMPUT SC, V4392, P535
[8]  
Boneh D, 2011, LECT NOTES COMPUT SC, V6597, P253, DOI 10.1007/978-3-642-19571-6_16
[9]  
Chase M, 2007, LECT NOTES COMPUT SC, V4392, P515
[10]  
Cocks C.C., 2001, Lecture Notes in Computer Science, P360, DOI [DOI 10.1007/3-540-45325-3, DOI 10.1007/3-540-45325-332]