Achieving short ciphertexts or short secret-keys for adaptively secure general inner-product encryption

Tatsuaki Okamoto*, Katsuyuki Takashima

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contribution

62 Citations (Scopus)

Abstract

In this paper, we present two non-zero inner-product encryption (NIPE) schemes that are adaptively secure under a standard assumption, the decisional linear (DLIN) assumption, in the standard model. One of the proposed NIPE schemes features constant-size ciphertexts and the other features constant-size secret-keys. Our NIPE schemes imply an identity-based revocation (IBR) system with constant-size ciphertexts or constant-size secret-keys that is adaptively secure under the DLIN assumption. Any previous IBR scheme with constant-size ciphertexts or constant-size secret-keys was not adaptively secure in the standard model. This paper also presents two zero inner-product encryption (ZIPE) schemes each of which has constant-size ciphertexts or constant-size secret-keys and is adaptively secure under the DLIN assumption in the standard model. They imply an identity-based broadcast encryption (IBBE) system with constant-size ciphertexts or constant-size secret-keys that is adaptively secure under the DLIN assumption.

Original languageEnglish
Title of host publicationCryptology and Network Security - 10th International Conference, CANS 2011, Proceedings
Pages138-159
Number of pages22
DOIs
Publication statusPublished - 2011
Externally publishedYes
Event10th International Conference on Cryptography and Network Security, CANS 2011 - Sanya, China
Duration: 2011 Dec 102011 Dec 12

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume7092 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference10th International Conference on Cryptography and Network Security, CANS 2011
Country/TerritoryChina
CitySanya
Period11/12/1011/12/12

ASJC Scopus subject areas

  • Theoretical Computer Science
  • Computer Science(all)

Fingerprint

Dive into the research topics of 'Achieving short ciphertexts or short secret-keys for adaptively secure general inner-product encryption'. Together they form a unique fingerprint.

Cite this