

Author: Lee Kwangsu
Publisher: Springer Publishing Company
ISSN: 0925-1022
Source: Designs, Codes and Cryptography, Vol.58, Iss.3, 2011-03, pp. : 297-319
Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.
Abstract
Hidden vector encryption (HVE) is a particular kind of predicate encryption that is an important cryptographic primitive having many applications, and it provides conjunctive equality, subset, and comparison queries on encrypted data. In predicate encryption, a ciphertext is associated with attributes and a token corresponds to a predicate. The token that corresponds to a predicate f</i> can decrypt the ciphertext associated with attributes x</b> if and only if f</i>(x</b>) = 1. Currently, several HVE schemes were proposed where the ciphertext size, the token size, and the decryption cost are proportional to the number of attributes in the ciphertext. In this paper, we construct efficient HVE schemes where the token consists of just four group elements and the decryption only requires four bilinear map computations, independent of the number of attributes in the ciphertext. We first construct an HVE scheme in composite order bilinear groups and prove its selective security under the well-known assumptions. Next, we convert it to use prime order asymmetric bilinear groups where there are no efficiently computable isomorphisms between two groups.
Related content


Wildcarded Identity-Based Encryption
Journal of Cryptology, Vol. 24, Iss. 1, 2011-01 ,pp. :






Inner-product encryption under standard assumptions
By Park Jong
Designs, Codes and Cryptography, Vol. 58, Iss. 3, 2011-03 ,pp. :


A Forward-Secure Public-Key Encryption Scheme
By Canetti Ran
Journal of Cryptology, Vol. 20, Iss. 3, 2007-07 ,pp. :