Title
Private-Key Hidden Vector Encryption with Key Confidentiality
Abstract
Predicate encryption is an important cryptographic primitive that has been recently studied [BDOP04, BW07, GPSW06, KSW08] and that has found wide applications. Roughly speaking, in a predicate encryption scheme the owner of the master secret key K can derive secret key $\tilde K$, for any pattern vector k . In encrypting a message M , the sender can specify an attribute vector x and the resulting ciphertext $\tilde X$ can be decrypted only by using keys $\tilde K$ such that P (x , k ) = 1, for a fixed predicate P . A predicate encryption scheme thus gives the owner of the master secret key fine-grained control on which ciphertexts can be decrypted and this allows him to delegate the decryption of different types of messages (as specified by the attribute vector) to different entities. In this paper, we give a construction for hidden vector encryption which is a special case of predicate encryption schemes introduced by [BW07]. Here the ciphertext attributes are vectors x = ***x 1 ,...x l *** over alphabet Σ, key patterns are vectors k = ***k 1 ,...k l *** over alphabet Σ *** {*} and we consider the Match(x, k) predicate which is true if and only if k i *** * implies x i = k i . Besides guaranteeing the security of the attributes of a ciphertext, our construction also gives security guarantees for the key patterns. We stress that security guarantees for key patterns only make sense in a private-key setting and have been recently considered by [SSW09] which gave a construction in the symmetric bilinear setting with groups of composite (product of four primes) order. In contrast, our construction uses asymmetric bilinear groups of prime order and the length of the key is equal to the weight of the pattern, thus resulting in an increased efficiency. We remark that our construction is based on falsifiable (in the sense of [BW06, Nao03]) complexity assumptions for the asymmetric bilinear setting and are proved secure in the standard model (that is, without random oracles).
Year
DOI
Venue
2009
10.1007/978-3-642-10433-6_17
CANS
Keywords
Field
DocType
key confidentiality,predicate encryption scheme,master secret key k,secret key,tilde k,k i,security guarantee,attribute vector,key pattern,fixed predicate,private-key hidden vector encryption,secret key fine-grained control,standard model,random oracle
Computer security,Computer science,Attribute-based encryption,Deterministic encryption,Theoretical computer science,Encryption,Cryptographic primitive,40-bit encryption,Probabilistic encryption,Ciphertext,Public-key cryptography
Conference
Volume
ISSN
Citations 
5888
0302-9743
17
PageRank 
References 
Authors
0.77
11
3
Name
Order
Citations
PageRank
Carlo Blundo11901229.50
Vincenzo Iovino219813.20
Giuseppe Persiano31773152.14