2011
DOI: 10.1007/978-3-642-25513-7_11
|View full text |Cite
|
Sign up to set email alerts
|

Achieving Short Ciphertexts or Short Secret-Keys for Adaptively Secure General Inner-Product Encryption

Abstract: In this paper, we present two non-zero inner-product encryption (NIPE) schemes that are adaptively secure under a standard assumption, the decisional linear (DLIN) assumption, in the standard model. One of the proposed NIPE schemes features constant-size ciphertexts and the other features constant-size secret-keys. Our NIPE schemes imply an identity-based revocation (IBR) system with constant-size ciphertexts or constant-size secret-keys that is adaptively secure under the DLIN assumption. Any previous IBR sch… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
21
0

Year Published

2013
2013
2023
2023

Publication Types

Select...
5
3
1

Relationship

1
8

Authors

Journals

citations
Cited by 52 publications
(21 citation statements)
references
References 22 publications
0
21
0
Order By: Relevance
“…We also propose a new IPE scheme equipped with a specific characteristic to build EDE, namely the need for a short private key. The private key of our IPE scheme comprises of two group elements only, compared to the best efficient IPE scheme in the literature with nine group elements [3]. The EDE instantiation from our IPE will therefore save more than 75% secure memory for private key storage.…”
Section: Our Contributionsmentioning
confidence: 98%
“…We also propose a new IPE scheme equipped with a specific characteristic to build EDE, namely the need for a short private key. The private key of our IPE scheme comprises of two group elements only, compared to the best efficient IPE scheme in the literature with nine group elements [3]. The EDE instantiation from our IPE will therefore save more than 75% secure memory for private key storage.…”
Section: Our Contributionsmentioning
confidence: 98%
“…Thus an HIBE scheme based on DPVS that supports l-depth has linear-size of ciphertexts since it requires at least l-dimensions in DPVS. To reduce the dimensions of DPVS, one may try to use the technique of Okamoto and Takashima [38], but it only applied to non-anonymous schemes since it should reveal the identity of ciphertexts. 3 To support private key re-randomization using a public key, some elementsĝ,û,ĥ ∈Ĝ in a private key should be moved to a public key.…”
Section: Our Contributionsmentioning
confidence: 99%
“…PE schemes with linear-size ciphertexts that have the delegation capability include the dHVE scheme of Shi and Waters in composite order bilinear groups [42] and HIPE schemes of Okamoto and Takashima based on dual pairing vector spaces [31,36,37,39]. A non-anonymous HIPE scheme based on dual pairing vector spaces can have constant-size ciphertexts, but the ciphertext should contain a linear-size identity vector [38]. Though bilinear groups were widely used in the construction of HIBE, some HIBE schemes were designed in lattices [3,4,17].…”
Section: Related Workmentioning
confidence: 99%
“…Under this encryption system, a ciphertext conceals all attributes as well as the plaintext. PE for Inner Product Encryption is a new way of viewing encryption which opens up a much larger world of possibilities for sharing encrypted data [8][9][10][11][12][13][14]. In an Inner Product Encryption system, a relation…”
Section: Introductionmentioning
confidence: 99%