A Hidden Vector Encryption Scheme with Constant-Size Tokens and Pairing Computations
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Park, Jong Hwan | - |
dc.contributor.author | Lee, Dong Hoon | - |
dc.date.accessioned | 2021-09-08T00:21:53Z | - |
dc.date.available | 2021-09-08T00:21:53Z | - |
dc.date.issued | 2010-09 | - |
dc.identifier.issn | 0916-8508 | - |
dc.identifier.issn | 1745-1337 | - |
dc.identifier.uri | https://scholar.korea.ac.kr/handle/2021.sw.korea/115719 | - |
dc.description.abstract | The Hidden Vector Encryption scheme is one of the searchable public key encryption schemes that allow for searching encrypted data. The Hidden Vector Encryption scheme supports conjunctive equality, comparison, and subset queries, as well as arbitrary conjunctive combinations of these queries. In a Hidden Vector Encryption scheme, a receiver generates a token for a vector of searchable components and sends the token to a query server which has the capability to evaluate it on encrypted data. All of the existing Hidden Vector Encryption schemes, which are all pairing-based, require token elements and pairing computations proportional to the number of searchable components in the token. In this paper, we suggest an improved paring-based Hidden Vector Encryption scheme where the token elements and pairing computations are independent of the number of searchable components. Namely, for an arbitrary conjunctive search query, the token is of size O(1) and the query server only needs O(1) pairing computations. The latter improvement in particular might be very attractive to a query server in a larger search system with many users. To achieve our goal, we introduce a novel technique to generate a token, which may be of independent interest. | - |
dc.format.extent | 12 | - |
dc.language | 영어 | - |
dc.language.iso | ENG | - |
dc.publisher | IEICE-INST ELECTRONICS INFORMATION COMMUNICATIONS ENG | - |
dc.title | A Hidden Vector Encryption Scheme with Constant-Size Tokens and Pairing Computations | - |
dc.type | Article | - |
dc.publisher.location | 일본 | - |
dc.identifier.doi | 10.1587/transfun.E93.A.1620 | - |
dc.identifier.scopusid | 2-s2.0-77956490316 | - |
dc.identifier.wosid | 000282245600005 | - |
dc.identifier.bibliographicCitation | IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, v.E93A, no.9, pp 1620 - 1631 | - |
dc.citation.title | IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES | - |
dc.citation.volume | E93A | - |
dc.citation.number | 9 | - |
dc.citation.startPage | 1620 | - |
dc.citation.endPage | 1631 | - |
dc.type.docType | Article | - |
dc.description.isOpenAccess | N | - |
dc.description.journalRegisteredClass | scie | - |
dc.description.journalRegisteredClass | scopus | - |
dc.relation.journalResearchArea | Computer Science | - |
dc.relation.journalResearchArea | Engineering | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Hardware & Architecture | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Information Systems | - |
dc.relation.journalWebOfScienceCategory | Engineering, Electrical & Electronic | - |
dc.subject.keywordPlus | IDENTITY-BASED ENCRYPTION | - |
dc.subject.keywordPlus | PRIVACY | - |
dc.subject.keywordAuthor | hidden vector encryption | - |
dc.subject.keywordAuthor | searchable public key encryption | - |
dc.subject.keywordAuthor | bilinear maps | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
145 Anam-ro, Seongbuk-gu, Seoul, 02841, Korea+82-2-3290-2963
COPYRIGHT © 2021 Korea University. All Rights Reserved.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.