Improved hidden vector encryption with short ciphertexts and tokens
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Lee, Kwangsu | - |
dc.contributor.author | Lee, Dong Hoon | - |
dc.date.accessioned | 2021-09-07T14:23:39Z | - |
dc.date.available | 2021-09-07T14:23:39Z | - |
dc.date.created | 2021-06-14 | - |
dc.date.issued | 2011-03 | - |
dc.identifier.issn | 0925-1022 | - |
dc.identifier.uri | https://scholar.korea.ac.kr/handle/2021.sw.korea/112884 | - |
dc.description.abstract | Hidden vector encryption (HVE) is a particular kind of predicate encryption that is an important cryptographic primitive having many applications, and it provides conjunctive equality, subset, and comparison queries on encrypted data. In predicate encryption, a ciphertext is associated with attributes and a token corresponds to a predicate. The token that corresponds to a predicate f can decrypt the ciphertext associated with attributes x if and only if f(x) = 1. Currently, several HVE schemes were proposed where the ciphertext size, the token size, and the decryption cost are proportional to the number of attributes in the ciphertext. In this paper, we construct efficient HVE schemes where the token consists of just four group elements and the decryption only requires four bilinear map computations, independent of the number of attributes in the ciphertext. We first construct an HVE scheme in composite order bilinear groups and prove its selective security under the well-known assumptions. Next, we convert it to use prime order asymmetric bilinear groups where there are no efficiently computable isomorphisms between two groups. | - |
dc.language | English | - |
dc.language.iso | en | - |
dc.publisher | SPRINGER | - |
dc.subject | IDENTITY-BASED ENCRYPTION | - |
dc.subject | PREDICATE ENCRYPTION | - |
dc.subject | IBE | - |
dc.title | Improved hidden vector encryption with short ciphertexts and tokens | - |
dc.type | Article | - |
dc.contributor.affiliatedAuthor | Lee, Kwangsu | - |
dc.contributor.affiliatedAuthor | Lee, Dong Hoon | - |
dc.identifier.doi | 10.1007/s10623-010-9412-x | - |
dc.identifier.scopusid | 2-s2.0-79952184707 | - |
dc.identifier.wosid | 000287707100006 | - |
dc.identifier.bibliographicCitation | DESIGNS CODES AND CRYPTOGRAPHY, v.58, no.3, pp.297 - 319 | - |
dc.relation.isPartOf | DESIGNS CODES AND CRYPTOGRAPHY | - |
dc.citation.title | DESIGNS CODES AND CRYPTOGRAPHY | - |
dc.citation.volume | 58 | - |
dc.citation.number | 3 | - |
dc.citation.startPage | 297 | - |
dc.citation.endPage | 319 | - |
dc.type.rims | ART | - |
dc.type.docType | Article | - |
dc.description.journalClass | 1 | - |
dc.description.journalRegisteredClass | scie | - |
dc.description.journalRegisteredClass | scopus | - |
dc.relation.journalResearchArea | Computer Science | - |
dc.relation.journalResearchArea | Mathematics | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Theory & Methods | - |
dc.relation.journalWebOfScienceCategory | Mathematics, Applied | - |
dc.subject.keywordPlus | IDENTITY-BASED ENCRYPTION | - |
dc.subject.keywordPlus | PREDICATE ENCRYPTION | - |
dc.subject.keywordPlus | IBE | - |
dc.subject.keywordAuthor | Predicate encryption | - |
dc.subject.keywordAuthor | Hidden vector encryption | - |
dc.subject.keywordAuthor | Bilinear pairing | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
(02841) 서울특별시 성북구 안암로 14502-3290-1114
COPYRIGHT © 2021 Korea University. All Rights Reserved.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.