Towards Position-Aware Symbol-Based Searches on Encrypted Data from Symmetric Predicate Encryption Schemes

被引:1
作者
Tseng, Fu-Kuo [1 ]
Chen, Rong-Jaye [1 ]
机构
[1] Natl Chiao Tung Univ, Dept Comp Sci, Hsinchu, Taiwan
关键词
symmetric predicate encryption; symmetric inner-product encryption; position-aware symbol-based predicate; vector encoding;
D O I
10.1587/transfun.E99.A.426
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Symmetric predicate encryption schemes support a rich class of predicates over keyword ciphertexts while preserving both keyword privacy and predicate privacy. Most of these schemes treat each keyword as the smallest unit to be processed in the generation of ciphertexts and predicate tokens. To extend the class of predicates, we treat each symbol of a keyword as the smallest unit to be processed. In this letter, we propose a novel encoding to construct a symmetric inner-product encryption scheme for position-aware symbol-based predicates. The resulting scheme can be applied to a number of secure filtering and online storage services.
引用
收藏
页码:426 / 428
页数:3
相关论文
共 9 条
  • [1] Ciphertext-policy attribute-based encryption
    Bethencourt, John
    Sahai, Amit
    Waters, Brent
    [J]. 2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, : 321 - +
  • [2] Blundo C, 2009, LECT NOTES COMPUT SC, V5888, P259, DOI 10.1007/978-3-642-10433-6_17
  • [3] Boneh D, 2007, LECT NOTES COMPUT SC, V4392, P535
  • [4] Goyal V., 2006, P 2006 INT C PRIVACY, P1
  • [5] Predicate Encryption Supporting Disjunctions, Polynomial Equations, and Inner Products
    Katz, Jonathan
    Sahai, Amit
    Waters, Brent
    [J]. JOURNAL OF CRYPTOLOGY, 2013, 26 (02) : 191 - 224
  • [6] Shen E, 2009, LECT NOTES COMPUT SC, V5444, P457
  • [7] Tseng F.-K., 2014, LECT NOTES COMPUTER, V8639, P266
  • [8] Waters B, 2012, LECT NOTES COMPUT SC, V7417, P218
  • [9] Yoshino Masayuki, 2012, Provable Security. Proceedings of the 6th International Conference (ProvSec 2012), P215, DOI 10.1007/978-3-642-33272-2_14