Fully secure hidden vector encryption under standard assumptions

被引:14
|
作者
Park, Jong Hwan [1 ]
Lee, Kwangsu [1 ]
Susilo, Willy [2 ]
Lee, Dong Hoon [1 ]
机构
[1] Korea Univ, Ctr Informat Secur & Technol, Seoul, South Korea
[2] Univ Wollongong, Sch Comp Sci & Software Engn, Wollongong, NSW, Australia
基金
新加坡国家研究基金会;
关键词
Predicate encryption; Hidden vector encryption; Search on encrypted data; Dual system encryption; IDENTITY-BASED ENCRYPTION; DUAL SYSTEM ENCRYPTION; PREDICATE ENCRYPTION; FUNCTIONAL ENCRYPTION; SHORT CIPHERTEXTS; ANONYMOUS IBE; HIBE;
D O I
10.1016/j.ins.2012.12.034
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Hidden Vector Encryption (HVE) is a special type of predicate encryption that can support conjunctive equality and range searches on encrypted data. All previous HVE schemes were proven to be either selectively secure or weakly attribute-hiding. In this paper, we first construct a new HVE scheme that is fully secure under standard assumptions. Our HVE scheme, which is based on bilinear maps (pairings), provides efficiency advantages in that it requires O(1)-sized private keys and O(1) pairing computations for decryption, regardless of both the number of conjunctives and the dimension of vectors. To achieve our goal, we develop a novel technique to realize a tag-based dual system encryption in prime-order groups and show how to hide vector components and compress tag values into one. (C) 2013 Elsevier Inc. All rights reserved.
引用
收藏
页码:188 / 207
页数:20
相关论文
共 50 条
  • [31] Fully Homomorphic Encryption Using Hidden Ideal Lattice
    Plantard, Thomas
    Susilo, Willy
    Zhang, Zhenfei
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2013, 8 (12) : 2127 - 2137
  • [32] Fully secure attribute-based broadcast encryption
    [J]. Sun, J. (oksunjin@xaut.edu.cn), 2012, Science Press (39):
  • [33] Secure Face Matching Using Fully Homomorphic Encryption
    Boddeti, Vishnu Naresh
    [J]. 2018 IEEE 9TH INTERNATIONAL CONFERENCE ON BIOMETRICS THEORY, APPLICATIONS AND SYSTEMS (BTAS), 2018,
  • [34] Chosen-Ciphertext Secure Fully Homomorphic Encryption
    Canetti, Ran
    Raghuraman, Srinivasan
    Richelson, Silas
    Vaikuntanathan, Vinod
    [J]. PUBLIC-KEY CRYPTOGRAPHY (PKC 2017), PT II, 2017, 10175 : 213 - 240
  • [35] Secure optical storage that uses fully phase encryption
    Tan, XD
    Matoba, O
    Shimura, T
    Kuroda, K
    Javidi, B
    [J]. APPLIED OPTICS, 2000, 39 (35) : 6689 - 6694
  • [36] Secure Similarity Joins Using Fully Homomorphic Encryption
    Cruz, Mateus S. H.
    Amagasa, Toshiyuki
    Watanabe, Chiemi
    Lu, Wenjie
    Kitagawa, Hiroyuki
    [J]. 19TH INTERNATIONAL CONFERENCE ON INFORMATION INTEGRATION AND WEB-BASED APPLICATIONS & SERVICES (IIWAS2017), 2017, : 224 - 233
  • [37] Fully secure revocable attribute-based encryption
    Qian J.-L.
    Dong X.-L.
    [J]. Journal of Shanghai Jiaotong University (Science), 2011, 16 (4) : 490 - 496
  • [38] SoK: Towards CCA Secure Fully Homomorphic Encryption
    Okada, Hiroki
    Fukushima, Kazuhide
    [J]. PROCEEDINGS OF THE 20TH INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, SECRYPT 2023, 2023, : 793 - 798
  • [39] Secure Outsourced Matrix Multiplication with Fully Homomorphic Encryption
    Zhu, Lin
    Hua, Qiang-sheng
    Chen, Yi
    Jin, Hai
    [J]. COMPUTER SECURITY - ESORICS 2023, PT I, 2024, 14344 : 249 - 269
  • [40] Fully Secure Revocable Attribute-Based Encryption
    钱俊磊
    董晓蕾
    [J]. Journal of Shanghai Jiaotong University(Science), 2011, 16 (04) : 490 - 496