A Hidden Vector Encryption Scheme with Constant-Size Tokens and Pairing Computations

被引:6
|
作者
Park, Jong Hwan [2 ]
Lee, Dong Hoon [1 ]
机构
[1] Korea Univ, Grad Sch Informat Management & Secur, Seoul, South Korea
[2] Kyung Hee Univ, Dept Appl Math, Coll Appl Sci, Yongin, South Korea
关键词
hidden vector encryption; searchable public key encryption; bilinear maps; IDENTITY-BASED ENCRYPTION; PRIVACY;
D O I
10.1587/transfun.E93.A.1620
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The Hidden Vector Encryption scheme is one of the searchable public key encryption schemes that allow for searching encrypted data. The Hidden Vector Encryption scheme supports conjunctive equality, comparison, and subset queries, as well as arbitrary conjunctive combinations of these queries. In a Hidden Vector Encryption scheme, a receiver generates a token for a vector of searchable components and sends the token to a query server which has the capability to evaluate it on encrypted data. All of the existing Hidden Vector Encryption schemes, which are all pairing-based, require token elements and pairing computations proportional to the number of searchable components in the token. In this paper, we suggest an improved paring-based Hidden Vector Encryption scheme where the token elements and pairing computations are independent of the number of searchable components. Namely, for an arbitrary conjunctive search query, the token is of size O(1) and the query server only needs O(1) pairing computations. The latter improvement in particular might be very attractive to a query server in a larger search system with many users. To achieve our goal, we introduce a novel technique to generate a token, which may be of independent interest.
引用
收藏
页码:1620 / 1631
页数:12
相关论文
共 50 条
  • [1] Efficient Hidden Vector Encryption with Constant-Size Ciphertext
    Tran Viet Xuan Phuong
    Yang, Guomin
    Susilo, Willy
    [J]. COMPUTER SECURITY - ESORICS 2014, PT I, 2014, 8712 : 472 - 487
  • [2] Multi-User Searchable Encryption Scheme With Constant-Size Keys
    Chang, YuJui
    Wu, JaLing
    [J]. 2017 IEEE 7TH INTERNATIONAL SYMPOSIUM ON CLOUD AND SERVICE COMPUTING (SC2 2017), 2017, : 98 - 103
  • [3] Improved hidden vector encryption with short ciphertexts and tokens
    Lee, Kwangsu
    Lee, Dong Hoon
    [J]. DESIGNS CODES AND CRYPTOGRAPHY, 2011, 58 (03) : 297 - 319
  • [4] Improved hidden vector encryption with short ciphertexts and tokens
    Kwangsu Lee
    Dong Hoon Lee
    [J]. Designs, Codes and Cryptography, 2011, 58 : 297 - 319
  • [5] On the Security of a Constant-Size Group Signature Scheme
    Zhang, Jianhong
    Zou, Jiancheng
    [J]. 2008 2ND INTERNATIONAL CONFERENCE ON ANTI-COUNTERFEITING, SECURITY AND IDENTIFICATION, 2008, : 212 - 215
  • [6] Direct Revocable Ciphertext Policy Attribute-Based Encryption Scheme with Constant-Size Ciphertext
    Zhu, Guo-Bin
    Xie, Xin
    Zhang, Xing
    Zhao, Yang
    Xiong, Hu
    [J]. Dianzi Keji Daxue Xuebao/Journal of the University of Electronic Science and Technology of China, 2021, 50 (01): : 76 - 83
  • [7] An Efficient Predicate Encryption with Constant Pairing Computations and Minimum Costs
    Kim, Intae
    Hwang, Seong Oun
    Park, Jong Hwan
    Park, Chanil
    [J]. IEEE TRANSACTIONS ON COMPUTERS, 2016, 65 (10) : 2947 - 2958
  • [8] Attribute-based encryption schemes with constant-size ciphertexts
    Attrapadung, Nuttapong
    Herranz, Javier
    Laguillaumie, Fabien
    Libert, Benoit
    de Panafieu, Elie
    Rafols, Carla
    [J]. THEORETICAL COMPUTER SCIENCE, 2012, 422 : 15 - 38
  • [9] DNA-chip-based dynamic broadcast encryption scheme with constant-size ciphertexts and decryption keys
    FANG XiWen
    LAI XueJia
    [J]. Science China(Information Sciences), 2014, 57 (09) : 126 - 135
  • [10] On the security of a practical constant-size ring signature scheme
    Zhang, Jianhong
    Bai, Wenle
    Jiang, Zhengtao
    [J]. International Journal of Network Security, 2020, 22 (03) : 394 - 398