Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

A Hidden Vector Encryption Scheme with Constant-Size Tokens and Pairing Computations

Full metadata record
DC Field Value Language
dc.contributor.authorPark, Jong Hwan-
dc.contributor.authorLee, Dong Hoon-
dc.date.accessioned2021-09-08T00:21:53Z-
dc.date.available2021-09-08T00:21:53Z-
dc.date.issued2010-09-
dc.identifier.issn0916-8508-
dc.identifier.issn1745-1337-
dc.identifier.urihttps://scholar.korea.ac.kr/handle/2021.sw.korea/115719-
dc.description.abstractThe Hidden Vector Encryption scheme is one of the searchable public key encryption schemes that allow for searching encrypted data. The Hidden Vector Encryption scheme supports conjunctive equality, comparison, and subset queries, as well as arbitrary conjunctive combinations of these queries. In a Hidden Vector Encryption scheme, a receiver generates a token for a vector of searchable components and sends the token to a query server which has the capability to evaluate it on encrypted data. All of the existing Hidden Vector Encryption schemes, which are all pairing-based, require token elements and pairing computations proportional to the number of searchable components in the token. In this paper, we suggest an improved paring-based Hidden Vector Encryption scheme where the token elements and pairing computations are independent of the number of searchable components. Namely, for an arbitrary conjunctive search query, the token is of size O(1) and the query server only needs O(1) pairing computations. The latter improvement in particular might be very attractive to a query server in a larger search system with many users. To achieve our goal, we introduce a novel technique to generate a token, which may be of independent interest.-
dc.format.extent12-
dc.language영어-
dc.language.isoENG-
dc.publisherIEICE-INST ELECTRONICS INFORMATION COMMUNICATIONS ENG-
dc.titleA Hidden Vector Encryption Scheme with Constant-Size Tokens and Pairing Computations-
dc.typeArticle-
dc.publisher.location일본-
dc.identifier.doi10.1587/transfun.E93.A.1620-
dc.identifier.scopusid2-s2.0-77956490316-
dc.identifier.wosid000282245600005-
dc.identifier.bibliographicCitationIEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, v.E93A, no.9, pp 1620 - 1631-
dc.citation.titleIEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES-
dc.citation.volumeE93A-
dc.citation.number9-
dc.citation.startPage1620-
dc.citation.endPage1631-
dc.type.docTypeArticle-
dc.description.isOpenAccessN-
dc.description.journalRegisteredClassscie-
dc.description.journalRegisteredClassscopus-
dc.relation.journalResearchAreaComputer Science-
dc.relation.journalResearchAreaEngineering-
dc.relation.journalWebOfScienceCategoryComputer Science, Hardware & Architecture-
dc.relation.journalWebOfScienceCategoryComputer Science, Information Systems-
dc.relation.journalWebOfScienceCategoryEngineering, Electrical & Electronic-
dc.subject.keywordPlusIDENTITY-BASED ENCRYPTION-
dc.subject.keywordPlusPRIVACY-
dc.subject.keywordAuthorhidden vector encryption-
dc.subject.keywordAuthorsearchable public key encryption-
dc.subject.keywordAuthorbilinear maps-
Files in This Item
There are no files associated with this item.
Appears in
Collections
School of Cyber Security > Department of Information Security > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher Lee, Dong Hoon photo

Lee, Dong Hoon
Department of Information Security
Read more

Altmetrics

Total Views & Downloads

BROWSE