Efficient Hidden Vector Encryption with Constant-Size Ciphertext

被引:0
|
作者
Tran Viet Xuan Phuong [1 ]
Yang, Guomin [1 ]
Susilo, Willy [1 ]
机构
[1] Univ Wollongong, Sch Comp Sci & Software Engn, Ctr Comp & Informat Secur Res, Wollongong, NSW 2522, Australia
来源
关键词
Hidden vector encryption; Ciphertext policy; Constant-size ciphertext; Viete's Formulas; IDENTITY-BASED ENCRYPTION; ATTRIBUTE-BASED ENCRYPTION;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A Hidden Vector Encryption (HVE) scheme is a special type of anonymous identity-based encryption (IBE) scheme where the attribute string associated with the ciphertext or the user secret key can contain wildcards. In this paper, we introduce two constant-size ciphertext-policy hidden vector encryption (CP-HVE) schemes. Our first scheme is constructed on composite order bilinear groups, while the second one is built on prime order bilinear groups. Both schemes are proven secure in a selective security model which captures plaintext (or payload) and attribute hiding. To the best of our knowledge, our schemes are the first HVE constructions that can achieve constant-size ciphertext among all the existing HVE schemes.
引用
收藏
页码:472 / 487
页数:16
相关论文
共 50 条
  • [31] Adaptive CCA broadcast encryption with constant-size secret keys and ciphertexts
    Duong-Hieu Phan
    David Pointcheval
    Siamak F. Shahandashti
    Mario Strefler
    [J]. International Journal of Information Security, 2013, 12 : 251 - 265
  • [32] Adaptive CCA broadcast encryption with constant-size secret keys and ciphertexts
    Phan, Duong-Hieu
    Pointcheval, David
    Shahandashti, Siamak F.
    Strefler, Mario
    [J]. INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2013, 12 (04) : 251 - 265
  • [33] Decentralized Broadcast Encryption Schemes with Constant Size Ciphertext and Fast Decryption
    Malluhi, Qutaibah
    Vinh Duc Tran
    Viet Cuong Trinh
    [J]. SYMMETRY-BASEL, 2020, 12 (06):
  • [34] Privacy-preserving fully anonymous ciphertext policy attribute-based broadcast encryption with constant-size secret keys and fast decryption
    Mandal, Mriganka
    [J]. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2020, 55
  • [35] Chosen-ciphertext secure multi-hop identity-based conditional proxy re-encryption with constant-size ciphertexts
    Liang, Kaitai
    Chu, Cheng-Kang
    Tan, Xiao
    Wong, Duncan S.
    Tang, Chunming
    Zhou, Jianying
    [J]. THEORETICAL COMPUTER SCIENCE, 2014, 539 : 87 - 105
  • [36] A ciphertext-policy hidden vector encryption scheme supporting multiuser keyword search
    Liao Zhenhua
    Wang Jinmiao
    Lang Bo
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (06) : 879 - 887
  • [37] Hierarchical ID-Based Searchable Encryption with Constant Size Ciphertext in Cloud
    Wang, Xiaofen
    Zhang, Xiaosong
    Mu, Yi
    [J]. 2015 IEEE INTERNATIONAL CONFERENCE ON SMART CITY/SOCIALCOM/SUSTAINCOM (SMARTCITY), 2015, : 1024 - 1031
  • [38] Two-Party Attribute-Based Key Agreement Protocol with Constant-Size Ciphertext and Key
    Li, Jiguo
    Hu, Shengzhou
    Zhang, Yichen
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2018,
  • [39] A Lightweight Attribute Based Encryption Scheme with Constant Size Ciphertext for Internet of Things
    Yang, Wenti
    Wang, Ruimiao
    Guan, Zhitao
    Wu, Longfei
    Du, Xiaojiang
    Guizani, Mohsen
    [J]. ICC 2020 - 2020 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2020,
  • [40] Generic conversions from CPA to CCA without ciphertext expansion for threshold ABE with constant-size ciphertexts
    Lai, Jianchang
    Guo, Fuchun
    Susilo, Willy
    Jiang, Peng
    Yang, Guomin
    Huang, Xinyi
    [J]. INFORMATION SCIENCES, 2022, 613 : 966 - 981