An Efficient Predicate Encryption with Constant Pairing Computations and Minimum Costs

被引:23
|
作者
Kim, Intae [1 ]
Hwang, Seong Oun [2 ]
Park, Jong Hwan [3 ]
Park, Chanil [4 ]
机构
[1] Hongik Univ, Dept Elect & Comp Engn, Sejong, South Korea
[2] Hongik Univ, Dept Comp & Informat Commun Engn, Sejong, South Korea
[3] Sangmyung Univ, Div Comp Sci, Seoul, South Korea
[4] Agcy Def Dev, Seoul, South Korea
基金
新加坡国家研究基金会;
关键词
Predicate encryption; inner product encryption; payload; hiding; attribute-hiding; BROADCAST ENCRYPTION; SCHEME;
D O I
10.1109/TC.2016.2526000
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Predicate encryption is a public-key encryption that supports attribute-hiding as well as payload-hiding and achieves high flexibility in terms of access control. Since Katz, Sahai, and Waters first proposed the predicate encryption scheme in 2008, several predicate encryption schemes have been published. Unfortunately these are impractical as they require O(n) pairing computations for decryption with considerably large sized public parameters, secret key, and ciphertext, where n is the dimension of the attribute/predicate vectors. In this paper, we propose a very efficient predicate encryption scheme that requires only n exponentiation plus three pairing computations for decryption with shorter sized public parameters, secret key, and ciphertext. The proposed scheme is proven selective attribute-secure against chosen-plaintext attacks in the standard model under the Asymmetric Decisional Bilinear Diffie-Hellman assumptions.
引用
收藏
页码:2947 / 2958
页数:12
相关论文
共 48 条
  • [1] An efficient certificateless aggregate signature with constant pairing computations
    Xiong, Hu
    Guan, Zhi
    Chen, Zhong
    Li, Fagen
    [J]. INFORMATION SCIENCES, 2013, 219 : 225 - 235
  • [2] A Hidden Vector Encryption Scheme with Constant-Size Tokens and Pairing Computations
    Park, Jong Hwan
    Lee, Dong Hoon
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2010, E93A (09) : 1620 - 1631
  • [3] Insecurity of an efficient certificateless aggregate signature with constant pairing computations
    He, Debiao
    Tian, Miaomiao
    Chen, Jianhua
    [J]. INFORMATION SCIENCES, 2014, 268 : 458 - 462
  • [4] Efficient Subset Predicate Encryption for Internet of Things
    Tseng, Yi-Fan
    Gao, Shih-Jie
    [J]. 2021 IEEE CONFERENCE ON DEPENDABLE AND SECURE COMPUTING (DSC), 2021,
  • [5] A framework for efficient minimum distance computations
    Johnson, DE
    Cohen, E
    [J]. 1998 IEEE INTERNATIONAL CONFERENCE ON ROBOTICS AND AUTOMATION, VOLS 1-4, 1998, : 3678 - 3684
  • [6] Reattack of a Certificateless Aggregate Signature Scheme with Constant Pairing Computations
    Tu, Hang
    He, Debiao
    Huang, Baojun
    [J]. SCIENTIFIC WORLD JOURNAL, 2014,
  • [7] Efficient computations of the Tate pairing for the large MOV degrees
    Izu, T
    Takagi, T
    [J]. IFORMATION SECURITY AND CRYPTOLOGY - ICISC 2002, 2002, 2587 : 283 - 297
  • [8] An ID-based aggregate signature scheme with constant pairing computations
    Shim, Kyung-Ah
    [J]. JOURNAL OF SYSTEMS AND SOFTWARE, 2010, 83 (10) : 1873 - 1880
  • [9] A Tag Based Encoding: An Efficient Encoding for Predicate Encryption in Prime Order Groups
    Kim, Jongkil
    Susilo, Willy
    Guo, Fuchun
    Au, Man Ho
    [J]. SECURITY AND CRYPTOGRAPHY FOR NETWORKS, SCN 2016, 2016, 9841 : 3 - 22
  • [10] Efficient certificate-based encryption schemes without pairing
    Le, Minh-Ha
    Kim, Intae
    Hwang, Seong Oun
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (18) : 5376 - 5391