Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

Fully secure hidden vector encryption under standard assumptions

Full metadata record
DC Field Value Language
dc.contributor.authorPark, Jong Hwan-
dc.contributor.authorLee, Kwangsu-
dc.contributor.authorSusilo, Willy-
dc.contributor.authorLee, Dong Hoon-
dc.date.accessioned2021-09-06T01:31:32Z-
dc.date.available2021-09-06T01:31:32Z-
dc.date.created2021-06-18-
dc.date.issued2013-05-20-
dc.identifier.issn0020-0255-
dc.identifier.urihttps://scholar.korea.ac.kr/handle/2021.sw.korea/103222-
dc.description.abstractHidden Vector Encryption (HVE) is a special type of predicate encryption that can support conjunctive equality and range searches on encrypted data. All previous HVE schemes were proven to be either selectively secure or weakly attribute-hiding. In this paper, we first construct a new HVE scheme that is fully secure under standard assumptions. Our HVE scheme, which is based on bilinear maps (pairings), provides efficiency advantages in that it requires O(1)-sized private keys and O(1) pairing computations for decryption, regardless of both the number of conjunctives and the dimension of vectors. To achieve our goal, we develop a novel technique to realize a tag-based dual system encryption in prime-order groups and show how to hide vector components and compress tag values into one. (C) 2013 Elsevier Inc. All rights reserved.-
dc.languageEnglish-
dc.language.isoen-
dc.publisherELSEVIER SCIENCE INC-
dc.subjectIDENTITY-BASED ENCRYPTION-
dc.subjectDUAL SYSTEM ENCRYPTION-
dc.subjectPREDICATE ENCRYPTION-
dc.subjectFUNCTIONAL ENCRYPTION-
dc.subjectSHORT CIPHERTEXTS-
dc.subjectANONYMOUS IBE-
dc.subjectHIBE-
dc.titleFully secure hidden vector encryption under standard assumptions-
dc.typeArticle-
dc.contributor.affiliatedAuthorLee, Kwangsu-
dc.contributor.affiliatedAuthorLee, Dong Hoon-
dc.identifier.doi10.1016/j.ins.2012.12.034-
dc.identifier.scopusid2-s2.0-84875423688-
dc.identifier.wosid000316774700012-
dc.identifier.bibliographicCitationINFORMATION SCIENCES, v.232, pp.188 - 207-
dc.relation.isPartOfINFORMATION SCIENCES-
dc.citation.titleINFORMATION SCIENCES-
dc.citation.volume232-
dc.citation.startPage188-
dc.citation.endPage207-
dc.type.rimsART-
dc.type.docTypeArticle-
dc.description.journalClass1-
dc.description.journalRegisteredClassscie-
dc.description.journalRegisteredClassscopus-
dc.relation.journalResearchAreaComputer Science-
dc.relation.journalWebOfScienceCategoryComputer Science, Information Systems-
dc.subject.keywordPlusIDENTITY-BASED ENCRYPTION-
dc.subject.keywordPlusDUAL SYSTEM ENCRYPTION-
dc.subject.keywordPlusPREDICATE ENCRYPTION-
dc.subject.keywordPlusFUNCTIONAL ENCRYPTION-
dc.subject.keywordPlusSHORT CIPHERTEXTS-
dc.subject.keywordPlusANONYMOUS IBE-
dc.subject.keywordPlusHIBE-
dc.subject.keywordAuthorPredicate encryption-
dc.subject.keywordAuthorHidden vector encryption-
dc.subject.keywordAuthorSearch on encrypted data-
dc.subject.keywordAuthorDual system encryption-
Files in This Item
There are no files associated with this item.
Appears in
Collections
School of Cyber Security > Department of Information Security > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher Lee, Dong Hoon photo

Lee, Dong Hoon
정보보호학과
Read more

Altmetrics

Total Views & Downloads

BROWSE