Hidden Vector Encryption Fully Secure Against Unrestricted Queries
نویسندگان
چکیده
Predicate encryption is an important cryptographic primitive (see [3, 6, 11, 14]) that enables fine-grained control on the decryption keys. Roughly speaking, in a predicate encryption scheme the owner of the master secret key Msk can derive secret key SkP , for any predicate P from a specified class of predicates P. In encrypting a message M , the sender can specify an attribute vector ~x and the resulting ciphertext X̃ can be decrypted only by using keys SkP such that P (~x) = 1. Our main contribution is the first construction of a predicate encryption scheme that can be proved fully secure against unrestricted queries by probabilistic polynomial-time adversaries under non-interactive constant sized (that is, independent of the length ` of the attribute vectors) hardness assumptions on bilinear groups of composite order. Specifically, we consider hidden vector encryption (HVE in short), a notable case of predicate encryption introduced by Boneh and Waters [6] and further developed in [24, 13, 22]. In a HVE scheme, the ciphertext attributes are vectors ~x = 〈x1, . . . , x`〉 of length ` over alphabet Σ, keys are associated with vectors ~y = 〈y1, . . . , y`〉 of length ` over alphabet Σ ∪ {?} and we consider the Match(~x, ~y) predicate which is true if and only if, for all i, yi 6= ? implies xi = yi. Previous constructions restricted the proof of security to adversaries that could ask only non-matching queries; that is, for challenge attribute vectors ~x0 and ~x1, the adversary could ask only for keys of vectors ~y for which Match(~x0, ~y) = Match(~x1, ~y) = false. Our proof employs the dual system methodology of Waters [26], that gave one of the first fully secure construction in this area, blended with a careful design of intermediate security games that keep into account the relationship between challenge ciphertexts and key queries.
منابع مشابه
Hidden Vector Encryption Fully Secure Against Unrestricted Queries No Question Left Unanswered
Predicate encryption is an important cryptographic primitive (see [3, 6, 10, 11]) that enables fine-grained control on the decryption keys. Let P be a binary predicate. Roughly speaking, in a predicate encryption scheme for predicate P the owner of the master secret key Msk can derive secret key Sk~y, for any vector ~y. In encrypting a message M , the sender can specify an attribute vector ~x a...
متن کاملLightweight Symmetric-Key Hidden Vector Encryption without Pairings
Hidden vector encryption (HVE), introduced by Boneh and Waters in TCC’07, is an expressive sub-class of predicate encryption, that allows conjunctive, subset, range and comparison queries over encrypted data. All existing HVE constructions in the cryptographic literature use bilinear pairings over either composite order or prime order groups. In this paper, we address the open problem of constr...
متن کاملSESOS: A Verifiable Searchable Outsourcing Scheme for Ordered Structured Data in Cloud Computing
While cloud computing is growing at a remarkable speed, privacy issues are far from being solved. One way to diminish privacy concerns is to store data on the cloud in encrypted form. However, encryption often hinders useful computation cloud services. A theoretical approach is to employ the so-called fully homomorphic encryption, yet the overhead is so high that it is not considered a viable s...
متن کاملFully secure hidden vector encryption under standard assumptions
Hidden Vector Encryption (HVE) is a special type of predicate encryption that can support conjunctive equality and range searches on encrypted data. All previous HVE schemes were proven to be either selectively secure or weakly attribute-hiding. In this paper, we first construct a new HVE scheme that is fully secure under standard assumptions. Our HVE scheme, which is based on bilinear maps (pa...
متن کاملOn the Achievability of Simulation-Based Security for Functional Encryption
This work attempts to clarify to what extent simulationbased security (SIM-security) is achievable for functional encryption (FE) and its relation to the weaker indistinguishability-based security (INDsecurity). Our main result is a compiler that transforms any FE scheme for the general circuit functionality (which we denote by Circuit-FE) meeting indistinguishability-based security (IND-securi...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- IACR Cryptology ePrint Archive
دوره 2011 شماره
صفحات -
تاریخ انتشار 2011