Outsource the Ciphertext Decryption of Inner Product Predicate Encryption Scheme Based on Prime Order Bilinear Map
نویسندگان
چکیده
In the private index predicate encryption scheme, the ciphertext not only hides the message, but also hides the attributes. Predicate encryption scheme can enforce the fine grained access control over the encrypted data and perform selective search on the encrypted data. However, the main efficiency drawback of predicate encryption scheme is that the size of the ciphertext and the time required to decrypt it scale with the complexity of the predicate. In this work, we proposed a novel inner product predicate encryption scheme with verifiable outsourced ciphertext decryption based on prime order bilinear group, which significantly reduces the overhead of the data consumer. In the proposed scheme, the data consumer provides the cloud server with a transformation key with which the cloud server transforms the ciphertext associated with the attributes which satisfy the predicate associated with the private key into a simple and short ciphertext, and thus it significantly reduces the time for the data consumer to decrypt the ciphertext, whereas the cloud server does not know the underlying plaintext message for any data consumer; simultaneously, the data consumer can check whether the transformation done by the cloud server is correct to verify the correctness of the transformation.
منابع مشابه
Succinct Predicate and Online-Offline Multi-Input Inner Product Encryptions under Standard Static Assumptions
This paper presents expressive predicate encryption (PE) systems, namely non-zero inner-product-predicate encryption (NIPPE) and attribute-based encryption (ABE) supporting monotone span programs achieving best known parameters among existing similar schemes under wellstudied static complexity assumptions. Both the constructions are built in composite order bilinear group setting and involve on...
متن کاملEfficient Hidden Vector Encryptions and Its Applications
Predicate encryption is a new paradigm of public key encryption that enables searches on encrypted data. Using the predicate encryption, we can search keywords or attributes on encrypted data without decrypting the ciphertexts. In predicate encryption, a ciphertext is associated with attributes and a token corresponds to a predicate. The token that corresponds to a predicate f can decrypt the c...
متن کاملPrivate-Key Hidden Vector Encryption with Key Confidentiality
Predicate encryption is an important cryptographic primitive that has been recently studied [BDOP04, BW07, GPSW06, KSW08] and that has found wide applications. Roughly speaking, in a predicate encryption scheme the owner of the master secret key K can derive secret key K̃, for any pattern vector ~k. In encrypting a message M , the sender can specify an attribute vector ~x and the resulting ciphe...
متن کاملCCA-secure Predicate Encryption from Pair Encoding in Prime Order Groups: Generic and Efficient
Attrapadung (Eurocrypt 2014) proposed a generic framework called pair encoding to simplify the design and proof of security of CPA-secure predicate encryption (PE) in composite order groups. Later Attrapadung (Asiacrypt 2016) extended this idea in prime order groups. Yamada et al. (PKC 2011, PKC 2012) and Nandi et al. (ePrint Archive: 2015/457, AAECC 2017) proposed generic conversion frameworks...
متن کاملSearching Keywords with Wildcards on Encrypted Data
A hidden vector encryption scheme (HVE) is a derivation of identity-based encryption, where the public key is actually a vector over a certain alphabet. The decryption key is also derived from such a vector, but this one is also allowed to have “?” (or wildcard) entries. Decryption is possible as long as these tuples agree on every position except where a “?” occurs. These schemes are useful fo...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- I. J. Network Security
دوره 19 شماره
صفحات -
تاریخ انتشار 2017