TY - JOUR
T1 - Adaptively attribute-hiding (hierarchical) inner product encryption
AU - Okamoto, Tatsuaki
AU - Takashima, Katsuyuki
N1 - Publisher Copyright:
Copyright © 2016 The Institute of Electronics, Information and Communication Engineers.
PY - 2016/1
Y1 - 2016/1
N2 - This paper proposes the first (practical) inner product encryption (IPE) scheme that is adaptively secure and fully attribute-hiding (attribute-hiding in the sense of the definition by Katz, Sahai and Waters), while the existing (practical) IPE schemes are either fully attribute-hiding but selectively secure or adaptively secure but weakly attribute-hiding. The proposed IPE scheme is proven to be adaptively secure and fully attributehiding under the decisional linear assumption in the standard model. The IPE scheme is comparably as efficient as the existing (practical) attributehiding IPE schemes. We also present a variant of the proposed IPE scheme with the same security that achieves shorter public and secret keys. A hierarchical IPE scheme can be constructed that is also adaptively secure and fully attribute-hiding under the same assumption. In this paper, we extend the dual system encryption technique by Waters into a more general manner, in which new forms of ciphertext and secret keys are employed and new types of information theoretical tricks are introduced along with several forms of computational reduction.
AB - This paper proposes the first (practical) inner product encryption (IPE) scheme that is adaptively secure and fully attribute-hiding (attribute-hiding in the sense of the definition by Katz, Sahai and Waters), while the existing (practical) IPE schemes are either fully attribute-hiding but selectively secure or adaptively secure but weakly attribute-hiding. The proposed IPE scheme is proven to be adaptively secure and fully attributehiding under the decisional linear assumption in the standard model. The IPE scheme is comparably as efficient as the existing (practical) attributehiding IPE schemes. We also present a variant of the proposed IPE scheme with the same security that achieves shorter public and secret keys. A hierarchical IPE scheme can be constructed that is also adaptively secure and fully attribute-hiding under the same assumption. In this paper, we extend the dual system encryption technique by Waters into a more general manner, in which new forms of ciphertext and secret keys are employed and new types of information theoretical tricks are introduced along with several forms of computational reduction.
KW - Attributehiding
KW - Functional encryption
KW - Inner product encryption
UR - http://www.scopus.com/inward/record.url?scp=84953225088&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84953225088&partnerID=8YFLogxK
U2 - 10.1587/transfun.E99.A.92
DO - 10.1587/transfun.E99.A.92
M3 - Article
AN - SCOPUS:84953225088
VL - E99A
SP - 92
EP - 117
JO - IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
JF - IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
SN - 0916-8508
IS - 1
ER -