Proceedings of the 4th International Symposium on Information, Computer, and Communications Security 2009
DOI: 10.1145/1533057.1533107
|View full text |Cite
|
Sign up to set email alerts
|

Delegate predicate encryption and its application to anonymous authentication

Abstract: Predicate encryption provides fine-grained control over encryption and decryption. In a predicate encryption scheme, message is encrypted with a set of attributes, and decryption key is incorporated with a predicate. Only when the predicate evaluates to true over these attributes, the message can be correctly decrypted. We propose an extension to predicate encryption named delegate predicate encryption. In our extension, a user generates a encryption capability of a set of attributes, then sends the capability… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2010
2010
2018
2018

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 8 publications
(6 citation statements)
references
References 18 publications
0
6
0
Order By: Relevance
“…Generalizing from the results of [32], this corollary follows from the property of attribute-hiding Corollary 1. An attribute-hiding HPE scheme is a DPE as defined in [32] if there exists a γ ∈ Γ such that (A × M, γ) is unital.…”
Section: Preliminariesmentioning
confidence: 69%
See 2 more Smart Citations
“…Generalizing from the results of [32], this corollary follows from the property of attribute-hiding Corollary 1. An attribute-hiding HPE scheme is a DPE as defined in [32] if there exists a γ ∈ Γ such that (A × M, γ) is unital.…”
Section: Preliminariesmentioning
confidence: 69%
“…The user can distribute this to certain parties who can then encrypt messages with attribute a obliviously. The realization in [32] is similar to the widely-used technique of publishing encryptions of "zero" in a homomorphic cryptosystem, which can then be treated as a key. In fact, this technique is adopted in [33] to transform a strongly homomorphic private-key scheme into a public-key one.…”
Section: Preliminariesmentioning
confidence: 99%
See 1 more Smart Citation
“…The problem of delegated verification has been first proposed, but not thoroughly formalized, in the work of Wei and Ye [44]. Their solution leverages the homomorphic properties of the predicate encryption scheme of Katz et al [34], but only achieves semi-honest security.…”
Section: Related Workmentioning
confidence: 99%
“…al [5] classify adversarial behaviors broadly in two classes: semi-honest and malicious. A semi-honest adversary follows the protocol faithfully but attempts to find out additional information about the other parties involved in the protocol.…”
Section: Security and Privacy Attributes For Biometric Key Authenmentioning
confidence: 99%