An Efficient Predicate Encryption with Constant Pairing Computations and Minimum Costs

被引:23
|
作者
Kim, Intae [1 ]
Hwang, Seong Oun [2 ]
Park, Jong Hwan [3 ]
Park, Chanil [4 ]
机构
[1] Hongik Univ, Dept Elect & Comp Engn, Sejong, South Korea
[2] Hongik Univ, Dept Comp & Informat Commun Engn, Sejong, South Korea
[3] Sangmyung Univ, Div Comp Sci, Seoul, South Korea
[4] Agcy Def Dev, Seoul, South Korea
基金
新加坡国家研究基金会;
关键词
Predicate encryption; inner product encryption; payload; hiding; attribute-hiding; BROADCAST ENCRYPTION; SCHEME;
D O I
10.1109/TC.2016.2526000
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Predicate encryption is a public-key encryption that supports attribute-hiding as well as payload-hiding and achieves high flexibility in terms of access control. Since Katz, Sahai, and Waters first proposed the predicate encryption scheme in 2008, several predicate encryption schemes have been published. Unfortunately these are impractical as they require O(n) pairing computations for decryption with considerably large sized public parameters, secret key, and ciphertext, where n is the dimension of the attribute/predicate vectors. In this paper, we propose a very efficient predicate encryption scheme that requires only n exponentiation plus three pairing computations for decryption with shorter sized public parameters, secret key, and ciphertext. The proposed scheme is proven selective attribute-secure against chosen-plaintext attacks in the standard model under the Asymmetric Decisional Bilinear Diffie-Hellman assumptions.
引用
收藏
页码:2947 / 2958
页数:12
相关论文
共 48 条
  • [41] An Efficient Key-Policy Attribute-Based Encryption Scheme with Constant Ciphertext Length
    Wang, Changji
    Luo, Jianfa
    [J]. MATHEMATICAL PROBLEMS IN ENGINEERING, 2013, 2013
  • [42] Efficient Anonymous Multi-receiver ID-based Encryption with Constant Decryption Cost
    Tseng, Yuh-Min
    Tsai, Tung-Tso
    Huang, Sen-Shan
    Chien, Hung-Yu
    [J]. 2014 INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE, ELECTRONICS AND ELECTRICAL ENGINEERING (ISEEE), VOLS 1-3, 2014, : 130 - +
  • [43] Computationally Efficient Ciphertext-Policy Attribute-Based Encryption with Constant-Size Ciphertexts
    Zhang, Yinghui
    Zheng, Dong
    Chen, Xiaofeng
    Li, Jin
    Li, Hui
    [J]. PROVABLE SECURITY, PROVSEC 2014, 2014, 8782 : 259 - 273
  • [44] Practical and Efficient Attribute-Based Encryption with Constant-Size Ciphertexts in Outsorced Verifiable Computation
    Zhang, Kai
    Gong, Junqing
    Tang, Shaohua
    Chen, Jie
    Li, Xiangxue
    Qian, Haifeng
    Cao, Zhenfu
    [J]. ASIA CCS'16: PROCEEDINGS OF THE 11TH ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2016, : 269 - 279
  • [45] EFFICIENT ALGORITHMS FOR MINIMUM-COST FLOW PROBLEMS WITH PIECEWISE-LINEAR CONVEX COSTS
    PINTO, Y
    SHAMIR, R
    [J]. ALGORITHMICA, 1994, 11 (03) : 256 - 277
  • [46] Efficient and Secure Ciphertext-Policy Attribute-Based Encryption Without Pairing for Cloud-Assisted Smart Grid
    Wang, Yong
    Chen, Biwen
    Li, Lei
    Ma, Qiang
    Li, Huicong
    He, Debiao
    [J]. IEEE ACCESS, 2020, 8 : 40704 - 40713
  • [47] Implementation and Evaluation of an Pairing-Based Anonymous Credential System with Constant-Size Proofs and Efficient Proof Generations
    Begum, Nasima
    Nakanishi, Toru
    Funabiki, Nobuo
    [J]. 2012 THIRD INTERNATIONAL CONFERENCE ON NETWORKING AND COMPUTING (ICNC 2012), 2012, : 264 - 268
  • [48] An Efficient Hierarchical Multi-Authority Attribute Based Encryption Scheme for Profile Matching using a Fast Ate Pairing in Cloud Environment
    Chandrasekaran, Balaji
    Nogami, Yasuyuki
    Balakrishnan, Ramadoss
    [J]. JOURNAL OF COMMUNICATIONS SOFTWARE AND SYSTEMS, 2018, 14 (02) : 151 - 156