### Abstract

Hidden vector encryption (HVE) is a particular kind of predicate encryption that is an important cryptographic primitive having many applications, and it provides conjunctive equality, subset, and comparison queries on encrypted data. In predicate encryption, a ciphertext is associated with attributes and a token corresponds to a predicate. The token that corresponds to a predicate f can decrypt the ciphertext associated with attributes x if and only if f(x) = 1. Currently, several HVE schemes were proposed where the ciphertext size, the token size, and the decryption cost are proportional to the number of attributes in the ciphertext. In this paper, we construct efficient HVE schemes where the token consists of just four group elements and the decryption only requires four bilinear map computations, independent of the number of attributes in the ciphertext. We first construct an HVE scheme in composite order bilinear groups and prove its selective security under the well-known assumptions. Next, we convert it to use prime order asymmetric bilinear groups where there are no efficiently computable isomorphisms between two groups.

Original language | English |
---|---|

Pages (from-to) | 297-319 |

Number of pages | 23 |

Journal | Designs, Codes, and Cryptography |

Volume | 58 |

Issue number | 3 |

DOIs | |

Publication status | Published - 2011 Mar 1 |

### Fingerprint

### Keywords

- Bilinear pairing
- Hidden vector encryption
- Predicate encryption

### ASJC Scopus subject areas

- Applied Mathematics
- Computer Science Applications

### Cite this

**Improved hidden vector encryption with short ciphertexts and tokens.** / Lee, Kwangsu; Lee, Dong Hoon.

Research output: Contribution to journal › Article

*Designs, Codes, and Cryptography*, vol. 58, no. 3, pp. 297-319. https://doi.org/10.1007/s10623-010-9412-x

}

TY - JOUR

T1 - Improved hidden vector encryption with short ciphertexts and tokens

AU - Lee, Kwangsu

AU - Lee, Dong Hoon

PY - 2011/3/1

Y1 - 2011/3/1

N2 - Hidden vector encryption (HVE) is a particular kind of predicate encryption that is an important cryptographic primitive having many applications, and it provides conjunctive equality, subset, and comparison queries on encrypted data. In predicate encryption, a ciphertext is associated with attributes and a token corresponds to a predicate. The token that corresponds to a predicate f can decrypt the ciphertext associated with attributes x if and only if f(x) = 1. Currently, several HVE schemes were proposed where the ciphertext size, the token size, and the decryption cost are proportional to the number of attributes in the ciphertext. In this paper, we construct efficient HVE schemes where the token consists of just four group elements and the decryption only requires four bilinear map computations, independent of the number of attributes in the ciphertext. We first construct an HVE scheme in composite order bilinear groups and prove its selective security under the well-known assumptions. Next, we convert it to use prime order asymmetric bilinear groups where there are no efficiently computable isomorphisms between two groups.

AB - Hidden vector encryption (HVE) is a particular kind of predicate encryption that is an important cryptographic primitive having many applications, and it provides conjunctive equality, subset, and comparison queries on encrypted data. In predicate encryption, a ciphertext is associated with attributes and a token corresponds to a predicate. The token that corresponds to a predicate f can decrypt the ciphertext associated with attributes x if and only if f(x) = 1. Currently, several HVE schemes were proposed where the ciphertext size, the token size, and the decryption cost are proportional to the number of attributes in the ciphertext. In this paper, we construct efficient HVE schemes where the token consists of just four group elements and the decryption only requires four bilinear map computations, independent of the number of attributes in the ciphertext. We first construct an HVE scheme in composite order bilinear groups and prove its selective security under the well-known assumptions. Next, we convert it to use prime order asymmetric bilinear groups where there are no efficiently computable isomorphisms between two groups.

KW - Bilinear pairing

KW - Hidden vector encryption

KW - Predicate encryption

UR - http://www.scopus.com/inward/record.url?scp=79952184707&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=79952184707&partnerID=8YFLogxK

U2 - 10.1007/s10623-010-9412-x

DO - 10.1007/s10623-010-9412-x

M3 - Article

VL - 58

SP - 297

EP - 319

JO - Designs, Codes, and Cryptography

JF - Designs, Codes, and Cryptography

SN - 0925-1022

IS - 3

ER -