We propose a new hidden vector encryption (HVE) scheme that we call a ciphertext-policy delegatable hidden vector encryption (CP-dHVE) scheme. Several HVE schemes have been proposed and their properties have been analyzed extensively. Nonetheless, the definition of the HVE has been left unchanged. We therefore reconsider it, and point out that the conventional HVE should be categorized as the key-policy HVE, because the vectors corresponding to the secret keys can contain wildcards (which specify an access policy) whereas those corresponding to the ciphertexts cannot contain them. We then formalize its dual concept, the ciphertext-policy HVE, and propose a concrete scheme. Then, as an application of our scheme, we propose a public-key encryption with conjunctive keyword search scheme that can be used in the hierarchical user systems. Our scheme is novel in that the ciphertext size grows logarithmically to the number of uses in the system, while that of a conventional scheme grows linearly.
The copyright of the original papers published on this site belongs to IEICE. Unauthorized use of the original or translated papers is prohibited. See IEICE Provisions on Copyright for details.
Copy
Mitsuhiro HATTORI, Takato HIRANO, Takashi ITO, Nori MATSUDA, Takumi MORI, Yusuke SAKAI, Kazuo OHTA, "Ciphertext-Policy Delegatable Hidden Vector Encryption and Its Application" in IEICE TRANSACTIONS on Fundamentals,
vol. E96-A, no. 1, pp. 53-67, January 2013, doi: 10.1587/transfun.E96.A.53.
Abstract: We propose a new hidden vector encryption (HVE) scheme that we call a ciphertext-policy delegatable hidden vector encryption (CP-dHVE) scheme. Several HVE schemes have been proposed and their properties have been analyzed extensively. Nonetheless, the definition of the HVE has been left unchanged. We therefore reconsider it, and point out that the conventional HVE should be categorized as the key-policy HVE, because the vectors corresponding to the secret keys can contain wildcards (which specify an access policy) whereas those corresponding to the ciphertexts cannot contain them. We then formalize its dual concept, the ciphertext-policy HVE, and propose a concrete scheme. Then, as an application of our scheme, we propose a public-key encryption with conjunctive keyword search scheme that can be used in the hierarchical user systems. Our scheme is novel in that the ciphertext size grows logarithmically to the number of uses in the system, while that of a conventional scheme grows linearly.
URL: https://global.ieice.org/en_transactions/fundamentals/10.1587/transfun.E96.A.53/_p
Copy
@ARTICLE{e96-a_1_53,
author={Mitsuhiro HATTORI, Takato HIRANO, Takashi ITO, Nori MATSUDA, Takumi MORI, Yusuke SAKAI, Kazuo OHTA, },
journal={IEICE TRANSACTIONS on Fundamentals},
title={Ciphertext-Policy Delegatable Hidden Vector Encryption and Its Application},
year={2013},
volume={E96-A},
number={1},
pages={53-67},
abstract={We propose a new hidden vector encryption (HVE) scheme that we call a ciphertext-policy delegatable hidden vector encryption (CP-dHVE) scheme. Several HVE schemes have been proposed and their properties have been analyzed extensively. Nonetheless, the definition of the HVE has been left unchanged. We therefore reconsider it, and point out that the conventional HVE should be categorized as the key-policy HVE, because the vectors corresponding to the secret keys can contain wildcards (which specify an access policy) whereas those corresponding to the ciphertexts cannot contain them. We then formalize its dual concept, the ciphertext-policy HVE, and propose a concrete scheme. Then, as an application of our scheme, we propose a public-key encryption with conjunctive keyword search scheme that can be used in the hierarchical user systems. Our scheme is novel in that the ciphertext size grows logarithmically to the number of uses in the system, while that of a conventional scheme grows linearly.},
keywords={},
doi={10.1587/transfun.E96.A.53},
ISSN={1745-1337},
month={January},}
Copy
TY - JOUR
TI - Ciphertext-Policy Delegatable Hidden Vector Encryption and Its Application
T2 - IEICE TRANSACTIONS on Fundamentals
SP - 53
EP - 67
AU - Mitsuhiro HATTORI
AU - Takato HIRANO
AU - Takashi ITO
AU - Nori MATSUDA
AU - Takumi MORI
AU - Yusuke SAKAI
AU - Kazuo OHTA
PY - 2013
DO - 10.1587/transfun.E96.A.53
JO - IEICE TRANSACTIONS on Fundamentals
SN - 1745-1337
VL - E96-A
IS - 1
JA - IEICE TRANSACTIONS on Fundamentals
Y1 - January 2013
AB - We propose a new hidden vector encryption (HVE) scheme that we call a ciphertext-policy delegatable hidden vector encryption (CP-dHVE) scheme. Several HVE schemes have been proposed and their properties have been analyzed extensively. Nonetheless, the definition of the HVE has been left unchanged. We therefore reconsider it, and point out that the conventional HVE should be categorized as the key-policy HVE, because the vectors corresponding to the secret keys can contain wildcards (which specify an access policy) whereas those corresponding to the ciphertexts cannot contain them. We then formalize its dual concept, the ciphertext-policy HVE, and propose a concrete scheme. Then, as an application of our scheme, we propose a public-key encryption with conjunctive keyword search scheme that can be used in the hierarchical user systems. Our scheme is novel in that the ciphertext size grows logarithmically to the number of uses in the system, while that of a conventional scheme grows linearly.
ER -