Presentation 2012-09-21
Adaptively Attribute-Hiding (Hierarchical) Inner Product Encryption
Tatsuaki OKAMOTO, Katsuyuki TAKASHIMA,
PDF Download Page PDF download Page Link
Abstract(in Japanese) (See Japanese page)
Abstract(in English) In [1], we proposed the first inner product encryption (IPE) scheme that is adaptively secure and fully attribute-hiding (attribute-hiding in the sense of the definition by Katz, Sahai and Waters), while the existing IPE schemes are either fully attribute-hiding but selectively secure or adaptively secure but weakly attribute-hiding. The proposed IPE scheme is proven to be adaptively secure and fully attribute-hiding under the decisional linear assumption in the standard model. The IPE scheme is comparably as efficient as the existing attribute-hiding IPE schemes. We also presented a variant of the proposed IPE scheme with the same security that achieves shorter public and secret keys. A hierarchical IPE scheme can be constructed that is also adaptively secure and fully attribute-hiding under the same assumption. In this work, we extended the dual system encryption technique by Waters into a more general manner, in which new forms of ciphertext and secret keys are employed and new types of information theoretical tricks are introduced along with several forms of computational reduction.
Keyword(in Japanese) (See Japanese page)
Keyword(in English) functional encryption / predicate encryption / inner product predicate
Paper # ISEC2012-52
Date of Issue

Conference Information
Committee ISEC
Conference Date 2012/9/14(1days)
Place (in Japanese) (See Japanese page)
Place (in English)
Topics (in Japanese) (See Japanese page)
Topics (in English)
Chair
Vice Chair
Secretary
Assistant

Paper Information
Registration To Information Security (ISEC)
Language JPN
Title (in Japanese) (See Japanese page)
Sub Title (in Japanese) (See Japanese page)
Title (in English) Adaptively Attribute-Hiding (Hierarchical) Inner Product Encryption
Sub Title (in English)
Keyword(1) functional encryption
Keyword(2) predicate encryption
Keyword(3) inner product predicate
1st Author's Name Tatsuaki OKAMOTO
1st Author's Affiliation Secure Platform Laboratories()
2nd Author's Name Katsuyuki TAKASHIMA
2nd Author's Affiliation Information Technology R&D Cente
Date 2012-09-21
Paper # ISEC2012-52
Volume (vol) vol.112
Number (no) 211
Page pp.pp.-
#Pages 38
Date of Issue