Decentralized Inner-Product Encryption with Constant-Size Ciphertext

被引:2
|
作者
Tseng, Yi-Fan [1 ]
Gao, Shih-Jie [1 ]
机构
[1] Natl Chengchi Univ, Dept Comp Sci, Taipei 11605, Taiwan
来源
APPLIED SCIENCES-BASEL | 2022年 / 12卷 / 02期
关键词
inner product encryption; decentralized inner product encryption; constant-size ciphertext; ATTRIBUTE-BASED ENCRYPTION; BROADCAST ENCRYPTION; PREDICATE ENCRYPTION; FUNCTIONAL ENCRYPTION; SECURITY;
D O I
10.3390/app12020636
中图分类号
O6 [化学];
学科分类号
0703 ;
摘要
With the rise of technology in recent years, more people are studying distributed system architecture, such as the e-government system. The advantage of this architecture is that when a single point of failure occurs, it does not cause the system to be invaded by other attackers, making the entire system more secure. On the other hand, inner product encryption (IPE) provides fine-grained access control, and can be used as a fundamental tool to construct other cryptographic primitives. Lots of studies for IPE have been proposed recently. The first and only existing decentralized IPE was proposed by Michalevsky and Joye in 2018. However, some restrictions in their scheme may make it impractical. First, the ciphertext size is linear to the length of the corresponding attribute vector; second, the number of authorities should be the same as the length of predicate vector. To cope with the aforementioned issues, we design the first decentralized IPE with constant-size ciphertext. The security of our scheme is proven under the l-DBDHE assumption in the random oracle model. Compared with Michalevsky and Joye's work, ours achieves better efficiency in ciphertext length and encryption/decryption cost.
引用
收藏
页数:16
相关论文
共 50 条
  • [1] Efficient Hidden Vector Encryption with Constant-Size Ciphertext
    Tran Viet Xuan Phuong
    Yang, Guomin
    Susilo, Willy
    [J]. COMPUTER SECURITY - ESORICS 2014, PT I, 2014, 8712 : 472 - 487
  • [2] Efficient Ciphertext Policy Attribute-Based Encryption with Constant-Size Ciphertext and Constant Computation-Cost
    Chen, Cheng
    Zhang, Zhenfeng
    Feng, Dengguo
    [J]. PROVABLE SECURITY, 2011, 6980 : 84 - 101
  • [3] Direct Revocable Ciphertext Policy Attribute-Based Encryption Scheme with Constant-Size Ciphertext
    Zhu, Guo-Bin
    Xie, Xin
    Zhang, Xing
    Zhao, Yang
    Xiong, Hu
    [J]. Dianzi Keji Daxue Xuebao/Journal of the University of Electronic Science and Technology of China, 2021, 50 (01): : 76 - 83
  • [4] Adaptively secure efficient broadcast encryption with constant-size secret key and ciphertext
    Liqing Chen
    Jiguo Li
    Yichen Zhang
    [J]. Soft Computing, 2020, 24 : 4589 - 4606
  • [5] Efficient dynamic threshold identity-based encryption with constant-size ciphertext
    Susilo, Willy
    Guo, Fuchun
    Mu, Yi
    [J]. THEORETICAL COMPUTER SCIENCE, 2016, 609 : 49 - 59
  • [6] Adaptively secure efficient broadcast encryption with constant-size secret key and ciphertext
    Chen, Liqing
    Li, Jiguo
    Zhang, Yichen
    [J]. SOFT COMPUTING, 2020, 24 (06) : 4589 - 4606
  • [7] Functional Encryption for Inner Product: Achieving Constant-Size Ciphertexts with Adaptive Security or Support for Negation
    Attrapadung, Nuttapong
    Libert, Benoit
    [J]. PUBLIC KEY CRYPTOGRAPHY - PKC 2010, PROCEEDINGS, 2010, 6056 : 384 - 402
  • [8] Decentralized Broadcast Encryption Schemes with Constant Size Ciphertext and Fast Decryption
    Malluhi, Qutaibah
    Vinh Duc Tran
    Viet Cuong Trinh
    [J]. SYMMETRY-BASEL, 2020, 12 (06):
  • [9] CCA2 secure biometric identity based encryption with constant-size ciphertext
    Yang Yang
    Yu-pu Hu
    Le-you Zhang
    Chun-hui Sun
    [J]. Journal of Zhejiang University SCIENCE C, 2011, 12 : 819 - 827