A Hidden Vector Encryption scheme with constant-size tokens and pairing computations

Jong Hwan Park, Dong Hoon Lee

Research output: Contribution to journalArticle

8 Citations (Scopus)

Abstract

The Hidden Vector Encryption scheme is one of the searchable public key encryption schemes that allow for searching encrypted data. The Hidden Vector Encryption scheme supports conjunctive equality, comparison, and subset queries, as well as arbitrary conjunctive combinations of these queries. In a Hidden Vector Encryption scheme, a receiver generates a token for a vector of searchable components and sends the token to a query server which has the capability to evaluate it on encrypted data. All of the existing Hidden Vector Encryption schemes, which are all pairing-based, require token elements and pairing computations proportional to the number of searchable components in the token. In this paper, we suggest an improved paring-based Hidden Vector Encryption scheme where the token elements and pairing computations are independent of the number of searchable components. Namely, for an arbitrary conjunctive search query, the token is of size 0(1) and the query server only needs 0(1) pairing computations. The latter improvement in particular might be very attractive to a query server in a larger search system with many users. To achieve our goal, we introduce a novel technique to generate a token, which may be of independent interest.

Original languageEnglish
Pages (from-to)1620-1631
Number of pages12
JournalIEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
VolumeE93-A
Issue number9
DOIs
Publication statusPublished - 2010 Sep

Keywords

  • Bilinear maps
  • Hidden vector encryption
  • Searchable public key encryption

ASJC Scopus subject areas

  • Signal Processing
  • Computer Graphics and Computer-Aided Design
  • Electrical and Electronic Engineering
  • Applied Mathematics

Fingerprint Dive into the research topics of 'A Hidden Vector Encryption scheme with constant-size tokens and pairing computations'. Together they form a unique fingerprint.

  • Cite this