Privacy preserving revocable predicate encryption revisited
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Lee, Kwangsu | - |
dc.contributor.author | Kim, Intae | - |
dc.contributor.author | Hwang, Seong Oun | - |
dc.date.accessioned | 2021-09-04T19:46:10Z | - |
dc.date.available | 2021-09-04T19:46:10Z | - |
dc.date.created | 2021-06-15 | - |
dc.date.issued | 2015-02 | - |
dc.identifier.issn | 1939-0114 | - |
dc.identifier.uri | https://scholar.korea.ac.kr/handle/2021.sw.korea/94577 | - |
dc.description.abstract | Predicate encryption (PE) that provides both the access control of ciphertexts and the privacy of ciphertexts is a new paradigm of public-key encryption. An important application of PE is a searchable encryption system in cloud storage, where it enables a client to securely outsource the search of a keyword on encrypted data without revealing the keyword to the cloud server. One practical issue of PE is to devise an efficient revocation method to revoke a user when the secret key of the user is compromised. Privacy preserving revocable PE (RPE) can provide not only revocation but also the privacy of revoked users. In this paper, we first define two new security models of privacy preserving RPE: the strongly full-hiding (FH) security and the weakly FH security. Next, we propose a general RPE construction from any PE scheme and prove its security in the weakly FH security model. Our generic RPE scheme is efficient because the number of ciphertext elements is not proportional to the number of users in a receiver set. Additionally, our RPE scheme can support polynomial-size circuits if a recently proposed functional encryption scheme for polynomial-size circuits is used as an underlying PE scheme. Copyright (C) 2014 John Wiley & Sons, Ltd. | - |
dc.language | English | - |
dc.language.iso | en | - |
dc.publisher | WILEY-HINDAWI | - |
dc.subject | HIDDEN VECTOR ENCRYPTION | - |
dc.subject | SUPPORTING DISJUNCTIONS | - |
dc.subject | POLYNOMIAL EQUATIONS | - |
dc.subject | BROADCAST | - |
dc.title | Privacy preserving revocable predicate encryption revisited | - |
dc.type | Article | - |
dc.contributor.affiliatedAuthor | Lee, Kwangsu | - |
dc.identifier.doi | 10.1002/sec.994 | - |
dc.identifier.scopusid | 2-s2.0-84921033654 | - |
dc.identifier.wosid | 000348143600011 | - |
dc.identifier.bibliographicCitation | SECURITY AND COMMUNICATION NETWORKS, v.8, no.3, pp.471 - 485 | - |
dc.relation.isPartOf | SECURITY AND COMMUNICATION NETWORKS | - |
dc.citation.title | SECURITY AND COMMUNICATION NETWORKS | - |
dc.citation.volume | 8 | - |
dc.citation.number | 3 | - |
dc.citation.startPage | 471 | - |
dc.citation.endPage | 485 | - |
dc.type.rims | ART | - |
dc.type.docType | Article | - |
dc.description.journalClass | 1 | - |
dc.description.journalRegisteredClass | scie | - |
dc.description.journalRegisteredClass | scopus | - |
dc.relation.journalResearchArea | Computer Science | - |
dc.relation.journalResearchArea | Telecommunications | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Information Systems | - |
dc.relation.journalWebOfScienceCategory | Telecommunications | - |
dc.subject.keywordPlus | HIDDEN VECTOR ENCRYPTION | - |
dc.subject.keywordPlus | SUPPORTING DISJUNCTIONS | - |
dc.subject.keywordPlus | POLYNOMIAL EQUATIONS | - |
dc.subject.keywordPlus | BROADCAST | - |
dc.subject.keywordAuthor | public-key encryption | - |
dc.subject.keywordAuthor | predicate encryption | - |
dc.subject.keywordAuthor | revocation | - |
dc.subject.keywordAuthor | privacy | - |
dc.subject.keywordAuthor | adaptive security | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
(02841) 서울특별시 성북구 안암로 14502-3290-1114
COPYRIGHT © 2021 Korea University. All Rights Reserved.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.