Skip to main content
Log in

Inner-product encryption under standard assumptions

  • Published:
Designs, Codes and Cryptography Aims and scope Submit manuscript

Abstract

Predicate encryption is a generalized notion for public key encryption that enables one to encrypt attributes as well as a message. In this paper, we present a new inner-product encryption (IPE) scheme, as a specialized predicate encryption scheme, whose security relies on the well-known Decision Bilinear Diffie-Hellman (BDH) and Decision Linear assumptions. Our IPE scheme uses prime order groups equipped with a bilinear map and works in both symmetric and asymmetric bilinear maps. Our result is the first construction of IPE under the standard assumptions. Prior to our work, all IPE schemes known to date require non-standard assumptions to prove security, and moreover some of them use composite-order groups. To achieve our goal, we introduce a novel technique for attribute-hiding, which may be of independent interest.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  • Abdalla M., Bellare M., Catalano D., Kiltz E., Kohno T., Lange T., Malone-Lee J., Neven G., Paillier P., Shi H.: Searchable encryption revisited: consistency properties, relation to anonymous IBE, and extentions. In: CRYPTO‘05, vol. 3621, pp. 205–222. (2005).

  • Bethancourt J., Sahai A., Waters B.: Ciphertext-policy attribute-based encryption. In: IEEE Symposium on Security and Privacy, pp. 321–334. (2007).

  • Boneh D., Boyen X.: Efficient selective-ID secure identity based encryption without random oracles. In: EUROCRYPT‘04, vol. 3027, pp. 223–238. (2004).

  • Boneh D., Boyen X., Shacham H.: Short group signatures, In: CRYPTO‘04, vol. 3152, pp. 41–55 (2004).

  • Boneh D., Crescenzo G.D., Octrovsky R., Persiano G., Public key encryption with keyword search. In: EUROCRYPT‘04. vol. 3027, pp. 506–522. (2004).

  • Boneh D., Franklin M., Identity-based encryption from the Weil pairing. In: CRYPTO‘01, vol. 2139, pp. 213–229. (2001).

  • Boneh D., Gentry C., Hamburg M.: Space-efficient identity based encryption without pairings. In: FOCS‘07, pp. 647–657. (2007).

  • Boneh D., Waters B.: Conjunctive, subset, and range queries on encrypted data. In: TCC‘07, vol. 4392, pp. 535–554. (2007).

  • Boyen D., Waters B.: Anonymous hierarchical identity-based encryption (without random oracles). In: CRYPTO‘06, vol. 4117, pp. 290–307. (2006).

  • Chen L., Cheng Z.: Security proof of Sakai-Kasahara’s idenitty based encryption scheme. In: IMA‘05, vol. 3796, pp. 442–459. (2005).

  • Cocks C.: An identity based encryption scheme based on quadratic residues. In: IMA‘01. (2001).

  • Gentry C.: Practical identity-based encryption without random oracles. In: EUROCRYPT‘06, vol. 4004, pp. 445–464. (2006).

  • Goyal V., Pandey O., Sahai A., Waters B.: Attribute-based encryption for fine-grained access control of encrypted data. In: ACM-CCS‘06, pp. 89–98. (2006).

  • Iovino V., Persiano G.: Hidden-vector encryption with groups of prime order. In: Pairing‘08, vol. 5209, pp. 75–88. (2008).

  • Katz J., Sahai A., Waters, B.: Predicate encryption supporting disjunctions, polynomial equations, and inner products. In: EUROCRYPT‘08, vol. 4965, pp. 146–162 (2008).

  • Lewko A., Okamoto T., Sahai A., Takashima K., Waters B.: Fully secure functional encryption: attribute-based encryption and (hierarchical) inner-product encryption. To appear in EUROCRYPT‘10 (2010).

  • Okamoto T., Takashima K.: Hierarchical predicate encryption for inner-products. In: ASIACRYPT‘09, vol. 5912, pp. 214–231 (2009).

  • Ostrovsky R., Sahai A., Waters B.: Attribute-based encryption with non-monotonic access structures. In: ACM-CCS‘07, pp. 195–203. (2007).

  • Sahai A., Waters B.: Fuzzy identity-based encryption. In: EUROCRYPT‘05, vol. 3494, pp. 457–473 (2005).

  • Seo J.H., Kobayashi T., Oukubo M., Suzuki K.: Anonymous hierarchical identity-based enryption with constant size ciphertexts. In: PKC‘09, vol. 5443, pp. 215–234. (2009).

  • Waters B.: Efficient identity-based encryption without random oracles. In: EUROCRYPT‘05, vol. 3494, pp. 114–127. (2005).

  • Waters B.: Dual system encryption: realizing fully secure IBE and HIBE under simple assumptions. In: CRYPTO‘09, vol. 5677, pp. 619–636. (2009).

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jong Hwan Park.

Additional information

Communicated by S. D. Galbraith.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Park, J.H. Inner-product encryption under standard assumptions. Des. Codes Cryptogr. 58, 235–257 (2011). https://doi.org/10.1007/s10623-010-9405-9

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10623-010-9405-9

Keywords

Mathematics Subject Classification (2000)

Navigation