Fully secure hidden vector encryption under standard assumptions

被引:14
|
作者
Park, Jong Hwan [1 ]
Lee, Kwangsu [1 ]
Susilo, Willy [2 ]
Lee, Dong Hoon [1 ]
机构
[1] Korea Univ, Ctr Informat Secur & Technol, Seoul, South Korea
[2] Univ Wollongong, Sch Comp Sci & Software Engn, Wollongong, NSW, Australia
基金
新加坡国家研究基金会;
关键词
Predicate encryption; Hidden vector encryption; Search on encrypted data; Dual system encryption; IDENTITY-BASED ENCRYPTION; DUAL SYSTEM ENCRYPTION; PREDICATE ENCRYPTION; FUNCTIONAL ENCRYPTION; SHORT CIPHERTEXTS; ANONYMOUS IBE; HIBE;
D O I
10.1016/j.ins.2012.12.034
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Hidden Vector Encryption (HVE) is a special type of predicate encryption that can support conjunctive equality and range searches on encrypted data. All previous HVE schemes were proven to be either selectively secure or weakly attribute-hiding. In this paper, we first construct a new HVE scheme that is fully secure under standard assumptions. Our HVE scheme, which is based on bilinear maps (pairings), provides efficiency advantages in that it requires O(1)-sized private keys and O(1) pairing computations for decryption, regardless of both the number of conjunctives and the dimension of vectors. To achieve our goal, we develop a novel technique to realize a tag-based dual system encryption in prime-order groups and show how to hide vector components and compress tag values into one. (C) 2013 Elsevier Inc. All rights reserved.
引用
收藏
页码:188 / 207
页数:20
相关论文
共 50 条
  • [41] Fully secure revocable attribute-based encryption
    Qian J.-L.
    Dong X.-L.
    [J]. Journal of Shanghai Jiaotong University (Science), 2011, 16 (4) : 490 - 496
  • [42] Secure signal processing using fully homomorphic encryption
    Shortell, Thomas
    Shokoufandeh, Ali
    [J]. IET INFORMATION SECURITY, 2020, 14 (01) : 51 - 59
  • [43] Secure Signal Processing Using Fully Homomorphic Encryption
    Shortell, Thomas
    Shokoufandeh, Ali
    [J]. ADVANCED CONCEPTS FOR INTELLIGENT VISION SYSTEMS, ACIVS 2015, 2015, 9386 : 93 - 104
  • [44] Secure optical storage that uses fully phase encryption
    Tan, Xiaodi
    Matoba, Osamu
    Shimura, Tsutomu
    Kuroda, Kazuo
    Javidi, Bahram
    [J]. Applied Optics, 2000, 39 (35): : 6689 - 6694
  • [45] Secure matrix multiplication based on fully homomorphic encryption
    Hai Huang
    Haoran Zong
    [J]. The Journal of Supercomputing, 2023, 79 : 5064 - 5085
  • [46] Fully Secure Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner Product Encryption
    Lewko, Allison
    Okamoto, Tatsuaki
    Sahai, Amit
    Takashima, Katsuyuki
    Waters, Brent
    [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2010, 2010, 6110 : 62 - +
  • [47] Fully secure fuzzy identity-based encryption for secure IoT communications
    Mao, Yijun
    Li, Jin
    Chen, Min-Rong
    Liu, Jianan
    Xie, Congge
    Zhan, Yiju
    [J]. COMPUTER STANDARDS & INTERFACES, 2016, 44 : 117 - 121
  • [48] Identity-Based Matchmaking Encryption from Standard Assumptions
    Chen, Jie
    Li, Yu
    Wen, Jinming
    Weng, Jian
    [J]. ADVANCES IN CRYPTOLOGY-ASIACRYPT 2022, PT III, 2022, 13793 : 394 - 422
  • [49] Access Control Encryption for General Policies from Standard Assumptions
    Kim, Sam
    Wu, David J.
    [J]. ADVANCES IN CRYPTOLOGY - ASIACRYPT 2017, PT I, 2017, 10624 : 471 - 501
  • [50] Rate-1 Incompressible Encryption from Standard Assumptions
    Branco, Pedro
    Doettling, Nico
    Dujmovic, Jesko
    [J]. THEORY OF CRYPTOGRAPHY, TCC 2022, PT II, 2022, 13748 : 33 - 69