Generalized closest substring encryption

被引:3
作者
Guo, Fuchun [1 ]
Susilo, Willy [1 ]
Mu, Yi [1 ]
机构
[1] Univ Wollongong, Sch Comp Sci & Software Engn, Wollongong, NSW 2500, Australia
关键词
Encryption; Pattern matching; Closest substring problem; FUNCTIONAL ENCRYPTION; PREDICATE ENCRYPTION; CIPHERTEXTS; PROGRAM; DESIGN;
D O I
10.1007/s10623-015-0068-4
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We propose a new cryptographic notion called generalized closest substring encryption. In this notion, a ciphertext encrypted with a string can be decrypted with a private key of another string , if there exist a substring of , i.e. , and a substring of , i.e. , that are "close" to each other measured by their "overlap distance". The overlap distance between and is the number of identical positions at which the corresponding symbols are the same. In comparison with other encryption systems, the closest notion is the Fuzzy-IBE proposed by Sahai and Waters. The main difference is that the Fuzzy-IBE measures the overlap distance between and , while ours measures the overlap distance of all of their substrings (including the complete string), and we take the maximum value among those. The overlap distance between their substrings will measure the similarity of and more precisely compared to the overlap distance between the two complete strings. We note that embedding this overlap distance in an encryption is a challenging task, in particular in order to achieve a practical scheme. Therefore, we invent a new approach to develop a practical generalized closest substring encryption system. The novelty of our approach relies on the way we generate ciphertext and private key representing the complete string so that they can still measure the overlap distance of substrings. The size of ciphertext and private key grow linearly only in the length of the input string. We prove the security in the selective model under a generalization of decision -Bilinear Diffie-Hellman Exponent assumption.
引用
收藏
页码:103 / 124
页数:22
相关论文
共 32 条
[1]  
[Anonymous], 2010, 2010556 CRYPT EPRINT
[2]  
[Anonymous], 2007, P 2 ACM S INFORM COM
[3]   Ciphertext-policy attribute-based encryption [J].
Bethencourt, John ;
Sahai, Amit ;
Waters, Brent .
2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, :321-+
[4]  
Boneh D, 2005, LECT NOTES COMPUT SC, V3621, P258
[5]   Hierarchical identity based encryption with constant size ciphertext [J].
Boneh, D ;
Boyen, X ;
Goh, EJ .
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2005,PROCEEDINGS, 2005, 3494 :440-456
[6]   Identity-based encryption from the Weil pairing [J].
Boneh, D ;
Franklin, M .
SIAM JOURNAL ON COMPUTING, 2003, 32 (03) :586-615
[7]  
Boneh D, 2011, LECT NOTES COMPUT SC, V6597, P253, DOI 10.1007/978-3-642-19571-6_16
[8]  
Chase M, 2007, LECT NOTES COMPUT SC, V4392, P515
[9]  
Chase M, 2009, CCS'09: PROCEEDINGS OF THE 16TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P121
[10]  
Cheung L, 2007, CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P456