2012
DOI: 10.1007/978-3-642-30057-8_15
|View full text |Cite
|
Sign up to set email alerts
|

Verifiable Predicate Encryption and Applications to CCA Security and Anonymous Predicate Authentication

Abstract: In this paper, we focus on verifiability of predicate encryption. A verifiable predicate encryption scheme guarantees that all legitimate receivers of a ciphertext will obtain the same message upon decryption. While verifiability of predicate encryption might be a desirable property by itself, we furthermore show that this property enables interesting applications.Specifically, we provide two applications of verifiable predicate encryption. Firstly, we show that for a large class of verifiable predicate encryp… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
11
0

Year Published

2013
2013
2022
2022

Publication Types

Select...
6
3

Relationship

0
9

Authors

Journals

citations
Cited by 27 publications
(11 citation statements)
references
References 39 publications
0
11
0
Order By: Relevance
“…Anonymous Deniable Predicate Authentication. We should refer to the work of Yamada et al [24] of verifiable predicate encryption. As an application, they provided an anonymous deniable message authentication scheme.…”
Section: Related Workmentioning
confidence: 99%
“…Anonymous Deniable Predicate Authentication. We should refer to the work of Yamada et al [24] of verifiable predicate encryption. As an application, they provided an anonymous deniable message authentication scheme.…”
Section: Related Workmentioning
confidence: 99%
“…First, we should refer to the work of Yamada et al [16]. Our generic construction of ABID can be considered as a special case of their predicate authentication; however, it differs in at least two points.…”
Section: Related Workmentioning
confidence: 99%
“…For many practical purposes, the stronger (IND-CCA) security is assumed to be mandatory for the hired encryption scheme. Using the techniques [49,50,33,34], the above CPA-secure schemes can be lifted to show the CCA-security. In all these CCA conversions, a sort of index-transformation for predicate family is applied to the primitive CPA-secure PE scheme for the same family.…”
Section: Introductionmentioning
confidence: 99%
“…In all these CCA conversions, a sort of index-transformation for predicate family is applied to the primitive CPA-secure PE scheme for the same family. In addition to the CPA-decryption, the CCAdecryption 1 of the traditional approaches [49,50,33,34] has to preform either delegation or verifiability. But the problems the above techniques suffer, are (1) increased lengths of key-indices and data-indices and (2) extra cost for performing verifiability or delegation.…”
Section: Introductionmentioning
confidence: 99%