Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

Improved hidden vector encryption with short ciphertexts and tokens

Full metadata record
DC Field Value Language
dc.contributor.authorLee, Kwangsu-
dc.contributor.authorLee, Dong Hoon-
dc.date.accessioned2021-09-07T14:23:39Z-
dc.date.available2021-09-07T14:23:39Z-
dc.date.created2021-06-14-
dc.date.issued2011-03-
dc.identifier.issn0925-1022-
dc.identifier.urihttps://scholar.korea.ac.kr/handle/2021.sw.korea/112884-
dc.description.abstractHidden vector encryption (HVE) is a particular kind of predicate encryption that is an important cryptographic primitive having many applications, and it provides conjunctive equality, subset, and comparison queries on encrypted data. In predicate encryption, a ciphertext is associated with attributes and a token corresponds to a predicate. The token that corresponds to a predicate f can decrypt the ciphertext associated with attributes x if and only if f(x) = 1. Currently, several HVE schemes were proposed where the ciphertext size, the token size, and the decryption cost are proportional to the number of attributes in the ciphertext. In this paper, we construct efficient HVE schemes where the token consists of just four group elements and the decryption only requires four bilinear map computations, independent of the number of attributes in the ciphertext. We first construct an HVE scheme in composite order bilinear groups and prove its selective security under the well-known assumptions. Next, we convert it to use prime order asymmetric bilinear groups where there are no efficiently computable isomorphisms between two groups.-
dc.languageEnglish-
dc.language.isoen-
dc.publisherSPRINGER-
dc.subjectIDENTITY-BASED ENCRYPTION-
dc.subjectPREDICATE ENCRYPTION-
dc.subjectIBE-
dc.titleImproved hidden vector encryption with short ciphertexts and tokens-
dc.typeArticle-
dc.contributor.affiliatedAuthorLee, Kwangsu-
dc.contributor.affiliatedAuthorLee, Dong Hoon-
dc.identifier.doi10.1007/s10623-010-9412-x-
dc.identifier.scopusid2-s2.0-79952184707-
dc.identifier.wosid000287707100006-
dc.identifier.bibliographicCitationDESIGNS CODES AND CRYPTOGRAPHY, v.58, no.3, pp.297 - 319-
dc.relation.isPartOfDESIGNS CODES AND CRYPTOGRAPHY-
dc.citation.titleDESIGNS CODES AND CRYPTOGRAPHY-
dc.citation.volume58-
dc.citation.number3-
dc.citation.startPage297-
dc.citation.endPage319-
dc.type.rimsART-
dc.type.docTypeArticle-
dc.description.journalClass1-
dc.description.journalRegisteredClassscie-
dc.description.journalRegisteredClassscopus-
dc.relation.journalResearchAreaComputer Science-
dc.relation.journalResearchAreaMathematics-
dc.relation.journalWebOfScienceCategoryComputer Science, Theory & Methods-
dc.relation.journalWebOfScienceCategoryMathematics, Applied-
dc.subject.keywordPlusIDENTITY-BASED ENCRYPTION-
dc.subject.keywordPlusPREDICATE ENCRYPTION-
dc.subject.keywordPlusIBE-
dc.subject.keywordAuthorPredicate encryption-
dc.subject.keywordAuthorHidden vector encryption-
dc.subject.keywordAuthorBilinear pairing-
Files in This Item
There are no files associated with this item.
Appears in
Collections
School of Cyber Security > Department of Information Security > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher Lee, Dong Hoon photo

Lee, Dong Hoon
정보보호학과
Read more

Altmetrics

Total Views & Downloads

BROWSE