A Privacy-Preserving Encoding for Efficient Comparison Queries and Access Control from Predicate Encryption

被引:2
|
作者
Chen, Shao-Heng [1 ]
Tseng, Fu-Kuo [1 ]
Chen, Rong-Jaye [1 ]
机构
[1] Natl Chiao Tung Univ, 1001 Daxue Rd, Hsinchu 300, Taiwan
关键词
hidden vector encryption; encoding; comparison predicate; ciphertext-policy attribute based encryption; query and access control; PUBLIC-KEY ENCRYPTION;
D O I
10.3233/978-1-61499-484-8-788
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
A hidden vector encryption (HVE) scheme, one type of predicate encryption schemes, can support comparison predicates on encrypted keywords through encrypted predicates by pairing transformed keyword vectors with predicate vectors. However, the length of these vectors grows in proportion to the size of the keyword space and so does the system complexity. In this paper, we provide a privacy-preserving encoding for efficient comparison queries, where the length of the vectors and the system complexity is only logarithmically proportional to the size of the keyword space. In addition, our encoding integrates a HVE scheme and a ciphertext-policy attribute based encryption (CPABE) scheme. This integration provides not only the access control based on the searchable keywords but also balanced overheads among encryption, key generation and query for both computation and storage overheads.
引用
收藏
页码:788 / 797
页数:10
相关论文
共 50 条
  • [1] Privacy-Preserving Range Queries from Keyword Queries
    Di Crescenzo, Giovanni
    Ghosh, Abhrajit
    DATA AND APPLICATIONS SECURITY AND PRIVACY XXIX, 2015, 9149 : 35 - 50
  • [2] Efficient and Privacy-Preserving Similarity Query With Access Control in eHealthcare
    Zheng, Yandong
    Lu, Rongxing
    Guan, Yunguo
    Zhang, Songnian
    Shao, Jun
    Zhu, Hui
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2022, 17 : 880 - 893
  • [3] Privacy-preserving attribute-based access control using homomorphic encryption
    Kerl, Malte
    Bodin, Ulf
    Schelen, Olov
    CYBERSECURITY, 2025, 8 (01):
  • [4] Privacy-Preserving Graph Encryption for Approximate Constrained Shortest Distance Queries
    Shen, Meng
    Chen, Siqi
    Zhu, Liehuang
    Xiao, Renyi
    Xu, Ke
    Du, Xiaojiang
    2019 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2019,
  • [5] Efficient homomorphic encryption framework for privacy-preserving regression
    Byun, Junyoung
    Park, Saerom
    Choi, Yujin
    Lee, Jaewook
    APPLIED INTELLIGENCE, 2023, 53 (09) : 10114 - 10129
  • [6] Efficient homomorphic encryption framework for privacy-preserving regression
    Junyoung Byun
    Saerom Park
    Yujin Choi
    Jaewook Lee
    Applied Intelligence, 2023, 53 : 10114 - 10129
  • [7] An Efficient Privacy-Preserving Comparison Protocol
    Saha, Tushar Kanti
    Koshiba, Takeshi
    ADVANCES IN NETWORK-BASED INFORMATION SYSTEMS, NBIS-2017, 2018, 7 : 553 - 565
  • [8] Efficient and Privacy-Preserving Subgraph Matching Queries in Graph Federation
    Guan, Yunguo
    Lu, Rongxing
    Zhang, Songnian
    Lalla, Sean
    ICC 2023-IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, 2023, : 2282 - 2287
  • [9] Efficient privacy-preserving whole-genome variant queries
    Akguen, Mete
    Pfeifer, Nico
    Kohlbacher, Oliver
    BIOINFORMATICS, 2022, 38 (08) : 2202 - 2210
  • [10] Privacy preserving revocable predicate encryption revisited
    Lee, Kwangsu
    Kim, Intae
    Hwang, Seong Oun
    SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (03) : 471 - 485