File Download
There are no files associated with this item.
Links for fulltext
(May Require Subscription)
- Publisher Website: 10.1007/978-3-319-44618-9_1
- Scopus: eid_2-s2.0-84984804813
- WOS: WOS:000389516500001
- Find via
Supplementary
- Citations:
- Appears in Collections:
Conference Paper: A tag based encoding: An efficient encoding for predicate encryption in prime order groups
Title | A tag based encoding: An efficient encoding for predicate encryption in prime order groups |
---|---|
Authors | |
Keywords | Spatial encryption Prime order groups Predicate encryption Inner product encryption Encodings |
Issue Date | 2016 |
Citation | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2016, v. 9841 LNCS, p. 3-22 How to Cite? |
Abstract | © Springer International Publishing Switzerland 2016. We introduce a tag based encoding, a new generic framework for modular design of Predicate Encryption (PE) schemes in prime order groups. Our framework is equipped with a compiler which is adaptively secure in prime order groups under the standard Decisional Linear Assumption (DLIN). Compared with prior encoding frameworks in prime order groups which require multiple group elements to interpret a tuple of an encoding in a real scheme, our framework has a distinctive feature which is that each element of an encoding can be represented with only a group element and an integer. This difference allows us to construct amore efficient encryption scheme. In the current literature, the most efficient compiler was proposed by Chen, Gay and Wee (CGW) in Eurocrypt’15. It features one tuple of an encoding into two group elements under the Symmetric External Diffie-Hellman assumption (SXDH). Compared with their compiler, our encoding construction saves the size of either private keys or ciphertexts up-to 25% and reduces decryption time and the size of public key up-to 50% in 128 security level. Several new schemes such as inner product encryption with short keys, dual spatial encryption with short keys and hierarchical identity based encryption with short ciphertexts are also introduced as instances of our encoding. |
Persistent Identifier | http://hdl.handle.net/10722/280602 |
ISSN | 2023 SCImago Journal Rankings: 0.606 |
ISI Accession Number ID |
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Kim, Jongkil | - |
dc.contributor.author | Susilo, Willy | - |
dc.contributor.author | Guo, Fuchun | - |
dc.contributor.author | Au, Man Ho | - |
dc.date.accessioned | 2020-02-17T14:34:27Z | - |
dc.date.available | 2020-02-17T14:34:27Z | - |
dc.date.issued | 2016 | - |
dc.identifier.citation | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2016, v. 9841 LNCS, p. 3-22 | - |
dc.identifier.issn | 0302-9743 | - |
dc.identifier.uri | http://hdl.handle.net/10722/280602 | - |
dc.description.abstract | © Springer International Publishing Switzerland 2016. We introduce a tag based encoding, a new generic framework for modular design of Predicate Encryption (PE) schemes in prime order groups. Our framework is equipped with a compiler which is adaptively secure in prime order groups under the standard Decisional Linear Assumption (DLIN). Compared with prior encoding frameworks in prime order groups which require multiple group elements to interpret a tuple of an encoding in a real scheme, our framework has a distinctive feature which is that each element of an encoding can be represented with only a group element and an integer. This difference allows us to construct amore efficient encryption scheme. In the current literature, the most efficient compiler was proposed by Chen, Gay and Wee (CGW) in Eurocrypt’15. It features one tuple of an encoding into two group elements under the Symmetric External Diffie-Hellman assumption (SXDH). Compared with their compiler, our encoding construction saves the size of either private keys or ciphertexts up-to 25% and reduces decryption time and the size of public key up-to 50% in 128 security level. Several new schemes such as inner product encryption with short keys, dual spatial encryption with short keys and hierarchical identity based encryption with short ciphertexts are also introduced as instances of our encoding. | - |
dc.language | eng | - |
dc.relation.ispartof | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | - |
dc.subject | Spatial encryption | - |
dc.subject | Prime order groups | - |
dc.subject | Predicate encryption | - |
dc.subject | Inner product encryption | - |
dc.subject | Encodings | - |
dc.title | A tag based encoding: An efficient encoding for predicate encryption in prime order groups | - |
dc.type | Conference_Paper | - |
dc.description.nature | link_to_subscribed_fulltext | - |
dc.identifier.doi | 10.1007/978-3-319-44618-9_1 | - |
dc.identifier.scopus | eid_2-s2.0-84984804813 | - |
dc.identifier.volume | 9841 LNCS | - |
dc.identifier.spage | 3 | - |
dc.identifier.epage | 22 | - |
dc.identifier.eissn | 1611-3349 | - |
dc.identifier.isi | WOS:000389516500001 | - |
dc.identifier.issnl | 0302-9743 | - |