2013
DOI: 10.1016/j.ins.2012.12.034
|View full text |Cite
|
Sign up to set email alerts
|

Fully secure hidden vector encryption under standard assumptions

Abstract: Fully secure hidden vector encryption under standard assumptions AbstractHidden Vector Encryption (HVE) is a special type of predicate encryption that can support conjunctive equality and range searches on encrypted data. All previous HVE schemes were proven to be either selectively secure or weakly attribute-hiding. In this paper, we first construct a new HVE scheme that is fully secure under standard assumptions. Our HVE scheme, which is based on bilinear maps (pairings), provides efficiency advantages in th… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
14
0

Year Published

2014
2014
2022
2022

Publication Types

Select...
4
2

Relationship

2
4

Authors

Journals

citations
Cited by 17 publications
(14 citation statements)
references
References 29 publications
0
14
0
Order By: Relevance
“…Because the DBDH assumption is weaker than the 172 Decision Linear assumption in groups with symmetric bilinear maps [30], we have that ≤ (q + 2) , where is the maximum 173 value among { i } q i=0 and f under the Decision Linear assumption. Therefore, Waters' tag-based IBE system does not achieve a 174 tight security reduction overall, even though each transition has a tight reduction.…”
Section: Article In Pressmentioning
confidence: 99%
“…Because the DBDH assumption is weaker than the 172 Decision Linear assumption in groups with symmetric bilinear maps [30], we have that ≤ (q + 2) , where is the maximum 173 value among { i } q i=0 and f under the Decision Linear assumption. Therefore, Waters' tag-based IBE system does not achieve a 174 tight security reduction overall, even though each transition has a tight reduction.…”
Section: Article In Pressmentioning
confidence: 99%
“…As is defined in Definition 3.1, HVE [6][10] [11] is a type of predicate encryption where two vectors x and w over attributes are chosen, x is associated with a ciphertext, and w is associated with a token. The ciphertext matches the token if and only if the two vectors meet with Equation (1).…”
Section: Hidden Vector Encryption (Hve)mentioning
confidence: 99%
“…In this section, based on known schemes HVE[10] [11] and PRE [29], we present a concrete SC-PRE scheme which provides the privacy and authorization enforced encryption support for our CloudKeyBank framework by distributing its eight polynomial algorithms into the following two protocols: DepositKey protocol described in Section IV-B and With-drawKey protocol describe in Section IV-C.…”
Section: Sc-pre Based Cloudkeybank Frameworkmentioning
confidence: 99%
See 2 more Smart Citations