A Study of Pair Encodings: Predicate Encryption in Prime Order Groups

被引:55
作者
Agrawal, Shashank [1 ]
Chase, Melissa [2 ]
机构
[1] Univ Illinois, Champaign, IL USA
[2] Microsoft Res, Redmond, WA USA
来源
THEORY OF CRYPTOGRAPHY, TCC 2016-A, PT II | 2016年 / 9563卷
关键词
Predicate encryption; Attribute-based encryption; Pair encoding schemes; Dual system technique; Short ciphertexts; ATTRIBUTE-BASED ENCRYPTION; SECURE IBE;
D O I
10.1007/978-3-662-49099-0_10
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Pair encodings and predicate encodings, recently introduced by Attrapadung [2] andWee[36] respectively, greatly simplify the process of designing and analyzing predicate and attribute-based encryption schemes. However, they are still somewhat limited in that they are restricted to composite order groups, and the information theoretic properties are not sufficient to argue about many of the schemes. Here we focus on pair encodings, as the more general of the two. We first study the structure of these objects, then propose a new relaxed but still information theoretic security property. Next we show a generic construction for predicate encryption in prime order groups from our new property; it results in either semi-adaptive or full security depending on the encoding, and gives security under SXDH or DLIN. Finally, we demonstrate the range of our new property by using it to design the first semi-adaptively secure CP-ABE scheme with constant size ciphertexts.
引用
收藏
页码:259 / 288
页数:30
相关论文
共 37 条
[1]  
Akinyele JosephA., 2011, P 1 ACM WORKSHOP SEC, P75, DOI DOI 10.1145/2046614.2046628
[2]   Comparing the pairing efficiency over composite-order and prime-order elliptic curves [J].
Guillevic, Aurore .
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2013, 7954 LNCS :357-372
[3]  
[Anonymous], IACR CRYPTOLOGY EPRI
[4]  
Attrapadung N., 2015, IACR CRYPTOLOGY EPRI, V2015, P431
[5]  
Attrapadung N, 2014, LECT NOTES COMPUT SC, V8441, P557, DOI 10.1007/978-3-642-55220-5_31
[6]  
Attrapadung N, 2011, LECT NOTES COMPUT SC, V6571, P90, DOI 10.1007/978-3-642-19379-8_6
[7]  
Baden R, 2009, SIGCOMM 2009, P135
[8]  
Beimel Amos, 2011, Coding and Cryptology. Proceedings of the Third International Workshop, IWCC 2011, P11, DOI 10.1007/978-3-642-20901-7_2
[9]   Ciphertext-policy attribute-based encryption [J].
Bethencourt, John ;
Sahai, Amit ;
Waters, Brent .
2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, :321-+
[10]  
Boneh D, 2007, LECT NOTES COMPUT SC, V4392, P535