DOI QR코드

DOI QR Code

Bilinear Group에서 속성 은닉을 가지는 안전한 내적 암호화 방식

Secure Inner Product Encryption Scheme with Attribute Hiding in Bilinear Groups

  • 투고 : 2013.08.23
  • 발행 : 2014.01.25

초록

내적 암호화 방식은 비밀키와 암호문 사이에 파인 그레인 관계를 제공하는 암호학적 프리미티브이다. 본 논문은 완전한 속성 은닉 보호를 수행하는 새로운 IPE 방식을 제안한다. 제안한 IPE 방식은 합성 위수의 bilinear groups에 기반한다. 본 논문에서는 이중 암호화 시스템 체계를 사용하여 제안한 IPE의 완전한 속성 은닉 보호를 증명한다. 성능 분석에서 기존의 IPE 방식들과 제안한 IPE 방식의 연산량과 메모리 할당량을 비교한다.

Inner product encryption (IPE) scheme is a cryptographic primitive that provides fine grained relations between secret keys and ciphertexts. This paper proposes a new IPE scheme which achieves fully attribute hiding security. Our IPE scheme is based on bilinear groups of a composite order. We prove the fully attribute hiding security of our IPE by using dual encryption system framework. In performance analysis, we compare the computation cost and memory requirement of our proposed IPE to other existing IPE schemes.

키워드

참고문헌

  1. Dongyoung Koo, Junbeom Hur, and Hyunsoo Yoon, "Secure and efficient data retrieval over encrypted data using attribute-based encryption in cloud storage," Computers & Electrical Engineering, vol. 39, no. 1, pp. 34-46, 2013. https://doi.org/10.1016/j.compeleceng.2012.11.002
  2. Boneh, D. and Franklin, M, "Identity-Based Encryption from the Weil Pairing," SIAM Journal on Computing, vol. 32, no. 3, pp. 586-615, 2003. https://doi.org/10.1137/S0097539701398521
  3. Boyen, Xavier and Brent Waters, "Anonymous hierarchical identity-based encryption (without random oracles)." CRYPTO2006, pp. 290-307, 2006.
  4. Park, J. H., and Lee D. H.. "A hidden vector encryption scheme with constant-size tokens and pairing computations," IEICE transactions on fundamentals of electronics, communications and computer sciences, vol. 93, no. 9, pp. 1620-1631, 2010.
  5. Park, J. H., Lee, K., Susilo, W., and Lee, D. H., "Fully secure hidden vector encryption under standard assumptions," Information Sciences, vol. 232, pp. 188-207, 2013. https://doi.org/10.1016/j.ins.2012.12.034
  6. De Caro, Angelo, Vincenzo Iovino, and Giuseppe Persiano. "Fully secure hidden vector encryption," Pairing-Based Cryptography-Pairing 2012. pp. 102-121, 2013.
  7. Katz, Jonathan, Amit Sahai, and Brent Waters. "Predicate encryption supporting disjunctions, polynomial equations, and inner products," EUROCRYPT2008, pp. 146-162, 2008.
  8. Agrawal, Shweta, David Mandell Freeman, and Vinod Vaikuntanathan. "Functional encryption for inner product predicates from learning with errors," ASIACRYPT2011, pp. 21-40, 2011.
  9. Lewko, Allison, et al. "Fully secure functional encryption: Attribute-based encryption and (hierarchical) inner product encryption," EUROCRYPT2010, pp. 62-91, 2010.
  10. Attrapadung, Nuttapong, and Benoit Libert. "Functional encryption for inner product: Achieving constant-size ciphertexts with adaptive security or support for negation," Public Key Cryptography-PKC 2010, pp 384-402, 2010.
  11. Okamoto, Tatsuaki, and Katsuyuki Takashima. "Fully secure functional encryption with general relations from the decisional linear assumption," CRYPTO2010, pp. 191-208, 2010.
  12. Okamoto, Tatsuaki, and Katsuyuki Takashima. "Adaptively attribute-hiding (hierarchical) inner product encryption," EUROCRYPT2012, pp. 591-608, 2012.
  13. Okamoto, Tatsuaki, and Katsuyuki Takashima. "Fully secure unbounded inner-product and attribute-based encryption," ASIACRYPT2012, pp. 349-366, 2012.
  14. Okamoto, Tatsuaki and, Katsuyuki Takashima, "Efficient (Hierarchical) Inner-Product Encryption Tightly Reduced from the Decisional Linear Assumption," IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, vol. E96-A, no. 1, pp. 42-52, 2013. https://doi.org/10.1587/transfun.E96.A.42
  15. Boneh, Dan, et al. "Chosen-ciphertext security from identity-based encryption," SIAM Journal on Computing, vol. 36, no. 5, pp. 1301-1328, 2006.
  16. Waters, Brent. "Dual system encryption: Realizing fully secure IBE and HIBE under simple assumptions," CRYPTO2009, pp. 619-636, 2009.
  17. Lewko, Allison, and Brent Waters. "Unbounded HIBE and attribute-based encryption," EUROCRYPT2011, pp. 547-567, 2011.
  18. De Caro, Angelo, Vincenzo Iovino, and Giuseppe Persiano. "Fully secure anonymous hibe and secret-key anonymous ibe with short ciphertexts," Pairing-Based Cryptography- Pairing 2010, pp. 347-366, 2010.
  19. Freeman, David Mandell. "Converting pairing-based cryptosystems from compositeorder groups to prime-order groups," EUROCRYPT2010, pp. 44-61, 2010.