Efficient Hidden Vector Encryption with Constant-Size Ciphertext

被引:0
|
作者
Tran Viet Xuan Phuong [1 ]
Yang, Guomin [1 ]
Susilo, Willy [1 ]
机构
[1] Univ Wollongong, Sch Comp Sci & Software Engn, Ctr Comp & Informat Secur Res, Wollongong, NSW 2522, Australia
来源
关键词
Hidden vector encryption; Ciphertext policy; Constant-size ciphertext; Viete's Formulas; IDENTITY-BASED ENCRYPTION; ATTRIBUTE-BASED ENCRYPTION;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A Hidden Vector Encryption (HVE) scheme is a special type of anonymous identity-based encryption (IBE) scheme where the attribute string associated with the ciphertext or the user secret key can contain wildcards. In this paper, we introduce two constant-size ciphertext-policy hidden vector encryption (CP-HVE) schemes. Our first scheme is constructed on composite order bilinear groups, while the second one is built on prime order bilinear groups. Both schemes are proven secure in a selective security model which captures plaintext (or payload) and attribute hiding. To the best of our knowledge, our schemes are the first HVE constructions that can achieve constant-size ciphertext among all the existing HVE schemes.
引用
收藏
页码:472 / 487
页数:16
相关论文
共 50 条
  • [21] Attribute-Based Access Control with Constant-Size Ciphertext in Cloud Computing
    Teng, Wei
    Yang, Geng
    Xiang, Yang
    Zhang, Ting
    Wang, Dongyang
    [J]. IEEE TRANSACTIONS ON CLOUD COMPUTING, 2017, 5 (04) : 617 - 627
  • [22] Attribute-based encryption schemes with constant-size ciphertexts
    Attrapadung, Nuttapong
    Herranz, Javier
    Laguillaumie, Fabien
    Libert, Benoit
    de Panafieu, Elie
    Rafols, Carla
    [J]. THEORETICAL COMPUTER SCIENCE, 2012, 422 : 15 - 38
  • [23] Practical and Efficient Attribute-Based Encryption with Constant-Size Ciphertexts in Outsorced Verifiable Computation
    Zhang, Kai
    Gong, Junqing
    Tang, Shaohua
    Chen, Jie
    Li, Xiangxue
    Qian, Haifeng
    Cao, Zhenfu
    [J]. ASIA CCS'16: PROCEEDINGS OF THE 11TH ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2016, : 269 - 279
  • [24] Ciphertext-Policy Delegatable Hidden Vector Encryption and Its Application
    Hattori, Mitsuhiro
    Hirano, Takato
    Ito, Takashi
    Matsuda, Nori
    Mori, Takumi
    Sakai, Yusuke
    Ohta, Kazuo
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2013, E96A (01) : 53 - 67
  • [25] Revocable Broadcast Encryption with Constant Ciphertext and Private Key Size
    Jia Hongyong
    Chen Yue
    Yang Kuiwu
    Guo Yuanbo
    Wang Zhiwei
    [J]. CHINESE JOURNAL OF ELECTRONICS, 2019, 28 (04) : 690 - 697
  • [26] Revocable Broadcast Encryption with Constant Ciphertext and Private Key Size
    JIA Hongyong
    CHEN Yue
    YANG Kuiwu
    GUO Yuanbo
    WANG Zhiwei
    [J]. Chinese Journal of Electronics, 2019, 28 (04) : 690 - 697
  • [27] Binary Tree Encryption with Constant-Size Public Key in the Standard Model
    Feng, Shengyuan
    Gong, Junqing
    Chen, Jie
    [J]. COMPUTER JOURNAL, 2022, 65 (06): : 1489 - 1511
  • [28] Progressive Image Restoration Based on CP-ABE With Constant-Size Ciphertext and Constant Bilinear Calculation
    Sun, Huaibo
    Luo, Hong
    Sun, Yan
    [J]. IEEE ACCESS, 2019, 7 : 167032 - 167054
  • [29] Multi-User Searchable Encryption Scheme With Constant-Size Keys
    Chang, YuJui
    Wu, JaLing
    [J]. 2017 IEEE 7TH INTERNATIONAL SYMPOSIUM ON CLOUD AND SERVICE COMPUTING (SC2 2017), 2017, : 98 - 103
  • [30] Hierarchical Identity-Based Encryption with Constant-Size Private Keys
    Zhang, Leyou
    Wu, Qing
    Hu, Yupu
    [J]. ETRI JOURNAL, 2012, 34 (01) : 142 - 145