Efficient Hidden Vector Encryption with Constant-Size Ciphertext

被引:0
|
作者
Tran Viet Xuan Phuong [1 ]
Yang, Guomin [1 ]
Susilo, Willy [1 ]
机构
[1] Univ Wollongong, Sch Comp Sci & Software Engn, Ctr Comp & Informat Secur Res, Wollongong, NSW 2522, Australia
来源
关键词
Hidden vector encryption; Ciphertext policy; Constant-size ciphertext; Viete's Formulas; IDENTITY-BASED ENCRYPTION; ATTRIBUTE-BASED ENCRYPTION;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A Hidden Vector Encryption (HVE) scheme is a special type of anonymous identity-based encryption (IBE) scheme where the attribute string associated with the ciphertext or the user secret key can contain wildcards. In this paper, we introduce two constant-size ciphertext-policy hidden vector encryption (CP-HVE) schemes. Our first scheme is constructed on composite order bilinear groups, while the second one is built on prime order bilinear groups. Both schemes are proven secure in a selective security model which captures plaintext (or payload) and attribute hiding. To the best of our knowledge, our schemes are the first HVE constructions that can achieve constant-size ciphertext among all the existing HVE schemes.
引用
收藏
页码:472 / 487
页数:16
相关论文
共 50 条
  • [1] Efficient Ciphertext Policy Attribute-Based Encryption with Constant-Size Ciphertext and Constant Computation-Cost
    Chen, Cheng
    Zhang, Zhenfeng
    Feng, Dengguo
    [J]. PROVABLE SECURITY, 2011, 6980 : 84 - 101
  • [2] Adaptively secure efficient broadcast encryption with constant-size secret key and ciphertext
    Liqing Chen
    Jiguo Li
    Yichen Zhang
    [J]. Soft Computing, 2020, 24 : 4589 - 4606
  • [3] Efficient dynamic threshold identity-based encryption with constant-size ciphertext
    Susilo, Willy
    Guo, Fuchun
    Mu, Yi
    [J]. THEORETICAL COMPUTER SCIENCE, 2016, 609 : 49 - 59
  • [4] Adaptively secure efficient broadcast encryption with constant-size secret key and ciphertext
    Chen, Liqing
    Li, Jiguo
    Zhang, Yichen
    [J]. SOFT COMPUTING, 2020, 24 (06) : 4589 - 4606
  • [5] A Hidden Vector Encryption Scheme with Constant-Size Tokens and Pairing Computations
    Park, Jong Hwan
    Lee, Dong Hoon
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2010, E93A (09) : 1620 - 1631
  • [6] Decentralized Inner-Product Encryption with Constant-Size Ciphertext
    Tseng, Yi-Fan
    Gao, Shih-Jie
    [J]. APPLIED SCIENCES-BASEL, 2022, 12 (02):
  • [7] Computationally Efficient Ciphertext-Policy Attribute-Based Encryption with Constant-Size Ciphertexts
    Zhang, Yinghui
    Zheng, Dong
    Chen, Xiaofeng
    Li, Jin
    Li, Hui
    [J]. PROVABLE SECURITY, PROVSEC 2014, 2014, 8782 : 259 - 273
  • [8] CCA2 secure biometric identity based encryption with constant-size ciphertext
    Yang Yang
    Yu-pu Hu
    Le-you Zhang
    Chun-hui Sun
    [J]. Journal of Zhejiang University SCIENCE C, 2011, 12 : 819 - 827
  • [9] Constant-Size Ciphertext Attribute-Based Encryption from Multi-channel Broadcast Encryption
    Canard, Sebastien
    Viet Cuong Trinh
    [J]. INFORMATION SYSTEMS SECURITY, 2016, 10063 : 193 - 211