TY - GEN
T1 - Achieving short ciphertexts or short secret-keys for adaptively secure general inner-product encryption
AU - Okamoto, Tatsuaki
AU - Takashima, Katsuyuki
PY - 2011
Y1 - 2011
N2 - In this paper, we present two non-zero inner-product encryption (NIPE) schemes that are adaptively secure under a standard assumption, the decisional linear (DLIN) assumption, in the standard model. One of the proposed NIPE schemes features constant-size ciphertexts and the other features constant-size secret-keys. Our NIPE schemes imply an identity-based revocation (IBR) system with constant-size ciphertexts or constant-size secret-keys that is adaptively secure under the DLIN assumption. Any previous IBR scheme with constant-size ciphertexts or constant-size secret-keys was not adaptively secure in the standard model. This paper also presents two zero inner-product encryption (ZIPE) schemes each of which has constant-size ciphertexts or constant-size secret-keys and is adaptively secure under the DLIN assumption in the standard model. They imply an identity-based broadcast encryption (IBBE) system with constant-size ciphertexts or constant-size secret-keys that is adaptively secure under the DLIN assumption.
AB - In this paper, we present two non-zero inner-product encryption (NIPE) schemes that are adaptively secure under a standard assumption, the decisional linear (DLIN) assumption, in the standard model. One of the proposed NIPE schemes features constant-size ciphertexts and the other features constant-size secret-keys. Our NIPE schemes imply an identity-based revocation (IBR) system with constant-size ciphertexts or constant-size secret-keys that is adaptively secure under the DLIN assumption. Any previous IBR scheme with constant-size ciphertexts or constant-size secret-keys was not adaptively secure in the standard model. This paper also presents two zero inner-product encryption (ZIPE) schemes each of which has constant-size ciphertexts or constant-size secret-keys and is adaptively secure under the DLIN assumption in the standard model. They imply an identity-based broadcast encryption (IBBE) system with constant-size ciphertexts or constant-size secret-keys that is adaptively secure under the DLIN assumption.
UR - http://www.scopus.com/inward/record.url?scp=83755161618&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=83755161618&partnerID=8YFLogxK
U2 - 10.1007/978-3-642-25513-7_11
DO - 10.1007/978-3-642-25513-7_11
M3 - Conference contribution
AN - SCOPUS:83755161618
SN - 9783642255120
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 138
EP - 159
BT - Cryptology and Network Security - 10th International Conference, CANS 2011, Proceedings
T2 - 10th International Conference on Cryptography and Network Security, CANS 2011
Y2 - 10 December 2011 through 12 December 2011
ER -