Improved Dual System ABE in Prime-Order Groups via Predicate Encodings

被引:176
作者
Chen, Jie [1 ]
Gay, Romain [2 ]
Wee, Hoeteck [2 ]
机构
[1] E China Normal Univ, Shanghai 200062, Peoples R China
[2] ENS, F-75230 Paris 05, France
来源
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2015, PT II | 2015年 / 9057卷
关键词
IDENTITY-BASED ENCRYPTION; SECURE IBE; HIBE;
D O I
10.1007/978-3-662-46803-6_20
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We present a modular framework for the design of efficient adaptively secure attribute-based encryption (ABE) schemes for a large class of predicates under the standard k-Lin assumption in prime-order groups; this is the first uniform treatment of dual system ABE across different predicates and across both composite and prime-order groups. Via this framework, we obtain concrete efficiency improvements for several ABE schemes. Our framework has three novel components over prior works: (i) new techniques for simulating composite-order groups in prime-order ones, (ii) a refinement of prior encodings framework for dual system ABE in composite-order groups, (iii) an extension to weakly attribute-hiding predicate encryption (which includes anonymous identity-based encryption as a special case).
引用
收藏
页码:595 / 624
页数:30
相关论文
共 31 条
[1]  
Agrawal S, 2011, LECT NOTES COMPUT SC, V7073, P21, DOI 10.1007/978-3-642-25385-0_2
[2]   Comparing the pairing efficiency over composite-order and prime-order elliptic curves [J].
Guillevic, Aurore .
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2013, 7954 LNCS :357-372
[3]  
[Anonymous], 2013, PAIRING BASED CRYPTO
[4]  
Attrapadung N, 2014, LECT NOTES COMPUT SC, V8441, P557, DOI 10.1007/978-3-642-55220-5_31
[5]  
Blazy O, 2014, LECT NOTES COMPUT SC, V8616, P408, DOI 10.1007/978-3-662-44371-2_23
[6]   Hierarchical identity based encryption with constant size ciphertext [J].
Boneh, D ;
Boyen, X ;
Goh, EJ .
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2005,PROCEEDINGS, 2005, 3494 :440-456
[7]  
Boneh D, 2004, LECT NOTES COMPUT SC, V3027, P223
[8]   Identity-based encryption from the Weil pairing [J].
Boneh, D ;
Franklin, M .
SIAM JOURNAL ON COMPUTING, 2003, 32 (03) :586-615
[9]  
Boneh D, 2007, LECT NOTES COMPUT SC, V4392, P535
[10]  
Boneh D, 2014, LECT NOTES COMPUT SC, V8441, P533, DOI 10.1007/978-3-642-55220-5_30