Abstract
Predicate encryption is a generalized notion for public key encryption that enables one to encrypt attributes as well as a message. In this paper, we present a new inner-product encryption (IPE) scheme, as a specialized predicate encryption scheme, whose security relies on the well-known Decision Bilinear Diffie-Hellman (BDH) and Decision Linear assumptions. Our IPE scheme uses prime order groups equipped with a bilinear map and works in both symmetric and asymmetric bilinear maps. Our result is the first construction of IPE under the standard assumptions. Prior to our work, all IPE schemes known to date require non-standard assumptions to prove security, and moreover some of them use composite-order groups. To achieve our goal, we introduce a novel technique for attribute-hiding, which may be of independent interest.
Similar content being viewed by others
References
Abdalla M., Bellare M., Catalano D., Kiltz E., Kohno T., Lange T., Malone-Lee J., Neven G., Paillier P., Shi H.: Searchable encryption revisited: consistency properties, relation to anonymous IBE, and extentions. In: CRYPTO‘05, vol. 3621, pp. 205–222. (2005).
Bethancourt J., Sahai A., Waters B.: Ciphertext-policy attribute-based encryption. In: IEEE Symposium on Security and Privacy, pp. 321–334. (2007).
Boneh D., Boyen X.: Efficient selective-ID secure identity based encryption without random oracles. In: EUROCRYPT‘04, vol. 3027, pp. 223–238. (2004).
Boneh D., Boyen X., Shacham H.: Short group signatures, In: CRYPTO‘04, vol. 3152, pp. 41–55 (2004).
Boneh D., Crescenzo G.D., Octrovsky R., Persiano G., Public key encryption with keyword search. In: EUROCRYPT‘04. vol. 3027, pp. 506–522. (2004).
Boneh D., Franklin M., Identity-based encryption from the Weil pairing. In: CRYPTO‘01, vol. 2139, pp. 213–229. (2001).
Boneh D., Gentry C., Hamburg M.: Space-efficient identity based encryption without pairings. In: FOCS‘07, pp. 647–657. (2007).
Boneh D., Waters B.: Conjunctive, subset, and range queries on encrypted data. In: TCC‘07, vol. 4392, pp. 535–554. (2007).
Boyen D., Waters B.: Anonymous hierarchical identity-based encryption (without random oracles). In: CRYPTO‘06, vol. 4117, pp. 290–307. (2006).
Chen L., Cheng Z.: Security proof of Sakai-Kasahara’s idenitty based encryption scheme. In: IMA‘05, vol. 3796, pp. 442–459. (2005).
Cocks C.: An identity based encryption scheme based on quadratic residues. In: IMA‘01. (2001).
Gentry C.: Practical identity-based encryption without random oracles. In: EUROCRYPT‘06, vol. 4004, pp. 445–464. (2006).
Goyal V., Pandey O., Sahai A., Waters B.: Attribute-based encryption for fine-grained access control of encrypted data. In: ACM-CCS‘06, pp. 89–98. (2006).
Iovino V., Persiano G.: Hidden-vector encryption with groups of prime order. In: Pairing‘08, vol. 5209, pp. 75–88. (2008).
Katz J., Sahai A., Waters, B.: Predicate encryption supporting disjunctions, polynomial equations, and inner products. In: EUROCRYPT‘08, vol. 4965, pp. 146–162 (2008).
Lewko A., Okamoto T., Sahai A., Takashima K., Waters B.: Fully secure functional encryption: attribute-based encryption and (hierarchical) inner-product encryption. To appear in EUROCRYPT‘10 (2010).
Okamoto T., Takashima K.: Hierarchical predicate encryption for inner-products. In: ASIACRYPT‘09, vol. 5912, pp. 214–231 (2009).
Ostrovsky R., Sahai A., Waters B.: Attribute-based encryption with non-monotonic access structures. In: ACM-CCS‘07, pp. 195–203. (2007).
Sahai A., Waters B.: Fuzzy identity-based encryption. In: EUROCRYPT‘05, vol. 3494, pp. 457–473 (2005).
Seo J.H., Kobayashi T., Oukubo M., Suzuki K.: Anonymous hierarchical identity-based enryption with constant size ciphertexts. In: PKC‘09, vol. 5443, pp. 215–234. (2009).
Waters B.: Efficient identity-based encryption without random oracles. In: EUROCRYPT‘05, vol. 3494, pp. 114–127. (2005).
Waters B.: Dual system encryption: realizing fully secure IBE and HIBE under simple assumptions. In: CRYPTO‘09, vol. 5677, pp. 619–636. (2009).
Author information
Authors and Affiliations
Corresponding author
Additional information
Communicated by S. D. Galbraith.
Rights and permissions
About this article
Cite this article
Park, J.H. Inner-product encryption under standard assumptions. Des. Codes Cryptogr. 58, 235–257 (2011). https://doi.org/10.1007/s10623-010-9405-9
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10623-010-9405-9