Improved hidden vector encryption with short ciphertexts and tokens

Kwangsu Lee, Dong Hoon Lee

Research output: Contribution to journalArticle

15 Citations (Scopus)

Abstract

Hidden vector encryption (HVE) is a particular kind of predicate encryption that is an important cryptographic primitive having many applications, and it provides conjunctive equality, subset, and comparison queries on encrypted data. In predicate encryption, a ciphertext is associated with attributes and a token corresponds to a predicate. The token that corresponds to a predicate f can decrypt the ciphertext associated with attributes x if and only if f(x) = 1. Currently, several HVE schemes were proposed where the ciphertext size, the token size, and the decryption cost are proportional to the number of attributes in the ciphertext. In this paper, we construct efficient HVE schemes where the token consists of just four group elements and the decryption only requires four bilinear map computations, independent of the number of attributes in the ciphertext. We first construct an HVE scheme in composite order bilinear groups and prove its selective security under the well-known assumptions. Next, we convert it to use prime order asymmetric bilinear groups where there are no efficiently computable isomorphisms between two groups.

Original languageEnglish
Pages (from-to)297-319
Number of pages23
JournalDesigns, Codes, and Cryptography
Volume58
Issue number3
DOIs
Publication statusPublished - 2011 Mar 1

Fingerprint

Encryption
Cryptography
Predicate
Attribute
Bilinear Map
Convert
Isomorphism
Equality
Directly proportional
Composite
Query
If and only if
Subset
Composite materials
Costs

Keywords

  • Bilinear pairing
  • Hidden vector encryption
  • Predicate encryption

ASJC Scopus subject areas

  • Applied Mathematics
  • Computer Science Applications

Cite this

Improved hidden vector encryption with short ciphertexts and tokens. / Lee, Kwangsu; Lee, Dong Hoon.

In: Designs, Codes, and Cryptography, Vol. 58, No. 3, 01.03.2011, p. 297-319.

Research output: Contribution to journalArticle

@article{af1cb608bb4d4b829b68fcca1fe6d648,
title = "Improved hidden vector encryption with short ciphertexts and tokens",
abstract = "Hidden vector encryption (HVE) is a particular kind of predicate encryption that is an important cryptographic primitive having many applications, and it provides conjunctive equality, subset, and comparison queries on encrypted data. In predicate encryption, a ciphertext is associated with attributes and a token corresponds to a predicate. The token that corresponds to a predicate f can decrypt the ciphertext associated with attributes x if and only if f(x) = 1. Currently, several HVE schemes were proposed where the ciphertext size, the token size, and the decryption cost are proportional to the number of attributes in the ciphertext. In this paper, we construct efficient HVE schemes where the token consists of just four group elements and the decryption only requires four bilinear map computations, independent of the number of attributes in the ciphertext. We first construct an HVE scheme in composite order bilinear groups and prove its selective security under the well-known assumptions. Next, we convert it to use prime order asymmetric bilinear groups where there are no efficiently computable isomorphisms between two groups.",
keywords = "Bilinear pairing, Hidden vector encryption, Predicate encryption",
author = "Kwangsu Lee and Lee, {Dong Hoon}",
year = "2011",
month = "3",
day = "1",
doi = "10.1007/s10623-010-9412-x",
language = "English",
volume = "58",
pages = "297--319",
journal = "Designs, Codes, and Cryptography",
issn = "0925-1022",
publisher = "Springer Netherlands",
number = "3",

}

TY - JOUR

T1 - Improved hidden vector encryption with short ciphertexts and tokens

AU - Lee, Kwangsu

AU - Lee, Dong Hoon

PY - 2011/3/1

Y1 - 2011/3/1

N2 - Hidden vector encryption (HVE) is a particular kind of predicate encryption that is an important cryptographic primitive having many applications, and it provides conjunctive equality, subset, and comparison queries on encrypted data. In predicate encryption, a ciphertext is associated with attributes and a token corresponds to a predicate. The token that corresponds to a predicate f can decrypt the ciphertext associated with attributes x if and only if f(x) = 1. Currently, several HVE schemes were proposed where the ciphertext size, the token size, and the decryption cost are proportional to the number of attributes in the ciphertext. In this paper, we construct efficient HVE schemes where the token consists of just four group elements and the decryption only requires four bilinear map computations, independent of the number of attributes in the ciphertext. We first construct an HVE scheme in composite order bilinear groups and prove its selective security under the well-known assumptions. Next, we convert it to use prime order asymmetric bilinear groups where there are no efficiently computable isomorphisms between two groups.

AB - Hidden vector encryption (HVE) is a particular kind of predicate encryption that is an important cryptographic primitive having many applications, and it provides conjunctive equality, subset, and comparison queries on encrypted data. In predicate encryption, a ciphertext is associated with attributes and a token corresponds to a predicate. The token that corresponds to a predicate f can decrypt the ciphertext associated with attributes x if and only if f(x) = 1. Currently, several HVE schemes were proposed where the ciphertext size, the token size, and the decryption cost are proportional to the number of attributes in the ciphertext. In this paper, we construct efficient HVE schemes where the token consists of just four group elements and the decryption only requires four bilinear map computations, independent of the number of attributes in the ciphertext. We first construct an HVE scheme in composite order bilinear groups and prove its selective security under the well-known assumptions. Next, we convert it to use prime order asymmetric bilinear groups where there are no efficiently computable isomorphisms between two groups.

KW - Bilinear pairing

KW - Hidden vector encryption

KW - Predicate encryption

UR - http://www.scopus.com/inward/record.url?scp=79952184707&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=79952184707&partnerID=8YFLogxK

U2 - 10.1007/s10623-010-9412-x

DO - 10.1007/s10623-010-9412-x

M3 - Article

VL - 58

SP - 297

EP - 319

JO - Designs, Codes, and Cryptography

JF - Designs, Codes, and Cryptography

SN - 0925-1022

IS - 3

ER -