Fully secure hidden vector encryption under standard assumptions

被引:14
|
作者
Park, Jong Hwan [1 ]
Lee, Kwangsu [1 ]
Susilo, Willy [2 ]
Lee, Dong Hoon [1 ]
机构
[1] Korea Univ, Ctr Informat Secur & Technol, Seoul, South Korea
[2] Univ Wollongong, Sch Comp Sci & Software Engn, Wollongong, NSW, Australia
基金
新加坡国家研究基金会;
关键词
Predicate encryption; Hidden vector encryption; Search on encrypted data; Dual system encryption; IDENTITY-BASED ENCRYPTION; DUAL SYSTEM ENCRYPTION; PREDICATE ENCRYPTION; FUNCTIONAL ENCRYPTION; SHORT CIPHERTEXTS; ANONYMOUS IBE; HIBE;
D O I
10.1016/j.ins.2012.12.034
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Hidden Vector Encryption (HVE) is a special type of predicate encryption that can support conjunctive equality and range searches on encrypted data. All previous HVE schemes were proven to be either selectively secure or weakly attribute-hiding. In this paper, we first construct a new HVE scheme that is fully secure under standard assumptions. Our HVE scheme, which is based on bilinear maps (pairings), provides efficiency advantages in that it requires O(1)-sized private keys and O(1) pairing computations for decryption, regardless of both the number of conjunctives and the dimension of vectors. To achieve our goal, we develop a novel technique to realize a tag-based dual system encryption in prime-order groups and show how to hide vector components and compress tag values into one. (C) 2013 Elsevier Inc. All rights reserved.
引用
收藏
页码:188 / 207
页数:20
相关论文
共 50 条
  • [1] Fully Secure Functional Encryption for Inner Products, from Standard Assumptions
    Agrawal, Shweta
    Libert, Benoit
    Stehle, Damien
    [J]. ADVANCES IN CRYPTOLOGY (CRYPTO 2016), PT III, 2016, 9816 : 333 - 362
  • [2] Adaptively secure broadcast encryption under standard assumptions with better efficiency
    Lee, Kwangsu
    Lee, Dong Hoon
    [J]. IET INFORMATION SECURITY, 2015, 9 (03) : 149 - 157
  • [3] Hidden Ciphertext Policy Attribute-Based Encryption Under Standard Assumptions
    Phuong, Tran Viet Xuan
    Yang, Guomin
    Susilo, Willy
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2016, 11 (01) : 35 - 45
  • [4] Dual System Encryption: Realizing Fully Secure IBE and HIBE under Simple Assumptions
    Waters, Brent
    [J]. ADVANCES IN CRYPTOLOGY - CRYPTO 2009, 2009, 5677 : 619 - 636
  • [5] Fully secure constructions of spatial encryption with vector privacy
    Zhang, Mingwu
    Wang, Chunzhi
    Yang, Bo
    Takagi, Tsuyoshi
    [J]. INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2014, 27 (12) : 4307 - 4327
  • [6] Inner-product encryption under standard assumptions
    Park, Jong Hwan
    [J]. DESIGNS CODES AND CRYPTOGRAPHY, 2011, 58 (03) : 235 - 257
  • [7] Inner-product encryption under standard assumptions
    Jong Hwan Park
    [J]. Designs, Codes and Cryptography, 2011, 58 : 235 - 257
  • [8] A Fully Secure Revocable ID-Based Encryption in the Standard Model
    Tsai, Tung-Tso
    Tseng, Yuh-Min
    Wu, Tsu-Yang
    [J]. INFORMATICA, 2012, 23 (03) : 487 - 505
  • [9] CCA-Secure Identity-Based Matchmaking Encryption from Standard Assumptions
    Lin, Shen
    Li, Yu
    Chen, Jie
    [J]. INFORMATION SECURITY AND CRYPTOLOGY, INSCRYPT 2023, PT I, 2024, 14526 : 253 - 273
  • [10] Watermarkable Public Key Encryption with Efficient Extraction Under Standard Assumptions
    Baldimtsi, Foteini
    Kiayias, Aggelos
    Samari, Katerina
    [J]. SECURITY AND CRYPTOGRAPHY FOR NETWORKS (SCN 2022), 2022, 13409 : 244 - 267