Title
Verifiable predicate encryption and applications to CCA security and anonymous predicate authentication
Abstract
In this paper, we focus on verifiability of predicate encryption. A verifiable predicate encryption scheme guarantees that all legitimate receivers of a ciphertext will obtain the same message upon decryption. While verifiability of predicate encryption might be a desirable property by itself, we furthermore show that this property enables interesting applications. Specifically, we provide two applications of verifiable predicate encryption. Firstly, we show that for a large class of verifiable predicate encryption schemes, it is always possible to convert a chosen-plaintext secure scheme into a chosen-ciphertext secure one. Secondly, we show that a verifiable predicate encryption scheme allows the construction of a deniable predicate authentication scheme . This primitive enables a user to authenticate a message to a verifier using a private key satisfying a specified relation while at the same time allowing the user to deny ever having interacted with the verifier. This scheme furthermore guarantees the anonymity of the user in the sense that the verifier will learn nothing about the user's private key except that it satisfies the specified relation. Lastly, we show that many currently known predicate encryption schemes already provide verifiability, and furthermore demonstrate that many predicate encryption schemes which do not provide verifiability, can be easily converted into schemes providing verifiability. Our results not only highlight that verifiability is a very useful property of predicate encryption, but also show that efficient and practical schemes with this property can be obtained relatively easily.
Year
DOI
Venue
2012
10.1007/978-3-642-30057-8_15
Public Key Cryptography
Keywords
Field
DocType
chosen-plaintext secure scheme,predicate encryption scheme,anonymous predicate authentication,cca security,practical scheme,deniable predicate authentication scheme,desirable property,private key,predicate encryption,verifiable predicate encryption scheme,verifiable predicate encryption,specified relation
Multiple encryption,Broadcast encryption,Computer science,Computer security,Attribute-based encryption,Theoretical computer science,Encryption,Probabilistic encryption,40-bit encryption,On-the-fly encryption,56-bit encryption
Conference
Volume
ISSN
Citations 
7293
0302-9743
8
PageRank 
References 
Authors
0.48
41
6
Name
Order
Citations
PageRank
Shota Yamada19418.10
Nuttapong Attrapadung281139.85
Bagus Santoso3157.09
Jacob C. N. Schuldt438522.91
Goichiro Hanaoka5910101.53
Noboru Kunihiro642545.72