Generic Transformations of Predicate Encodings: Constructions and Applications

被引:20
作者
Ambrona, Miguel [1 ,2 ]
Barthe, Gilles [1 ]
Schmidt, Benedikt [3 ]
机构
[1] IMDEA Software Inst, Madrid, Spain
[2] Univ Politecn Madrid, Madrid, Spain
[3] Google, Mountain View, CA USA
来源
ADVANCES IN CRYPTOLOGY - CRYPTO 2017, PT I | 2017年 / 10401卷
关键词
ATTRIBUTE-BASED ENCRYPTION; DUAL SYSTEM ENCRYPTION; SECURE IBE; BROADCAST; SCHEME; HIBE;
D O I
10.1007/978-3-319-63688-7_2
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Predicate encodings (Wee, TCC 2014; Chen, Gay, Wee, EUROCRYPT 2015), are symmetric primitives that can be used for building predicate encryption schemes. We give an algebraic characterization of the notion of privacy from predicate encodings, and explore several of its consequences. Specifically, we propose more efficient predicate encodings for boolean formulae and arithmetic span programs, and generic optimizations of predicate encodings. We define new constructions to build boolean combination of predicate encodings. We formalize the relationship between predicate encodings and pair encodings (Attrapadung, EUROCRYPT 2014), another primitive that can be transformed generically into predicate encryption schemes, and compare our constructions for boolean combinations of pair encodings with existing similar constructions from pair encodings. Finally, we demonstrate that our results carry to tag-based encodings (Kim, Susilo, Guo, and Au, SCN 2016).
引用
收藏
页码:36 / 66
页数:31
相关论文
共 37 条
[1]  
Agrawal S, 2017, EUROCRYPT
[2]   A Study of Pair Encodings: Predicate Encryption in Prime Order Groups [J].
Agrawal, Shashank ;
Chase, Melissa .
THEORY OF CRYPTOGRAPHY, TCC 2016-A, PT II, 2016, 9563 :259-288
[3]  
Akinyele JosephA., 2010, Self-Protecting Electronic Medical Records Using Attribute-Based Encryption
[4]  
Anh D.T. T., 2014, Proceedings of the 4th ACM conference on Data and application security and privacy, P13, DOI DOI 10.1145/2557547.2557556
[5]  
Applebaum B, 2017, ELECT C COMPUTATIONA, V24, P38
[6]  
Aranha D.F., RELIC is an Efficient LIbrary for Cryptography
[7]  
Attrapadung N, 2015, 2015390 CRYPT EPRINT
[8]  
Attrapadung N, 2015, 2015157 CRYPT EPRINT
[9]  
Attrapadung N, 2014, LECT NOTES COMPUT SC, V8441, P557, DOI 10.1007/978-3-642-55220-5_31
[10]  
Attrapadung N, 2009, LECT NOTES COMPUT SC, V5671, P248, DOI 10.1007/978-3-642-03298-1_16