We construct such a scheme for predicates corresponding to the evaluation of inner products over N (for some large integer N). This, in turn, enables constructions in which predicates correspond to the evaluation of disjunctions, polynomials, CNF/DNF formulae, or threshold predicates (among others). Besides serving as what we feel is a significant step forward in the theory of predicate encryption, our results lead to a number of applications that are interesting in their own right.
Category / Keywords: public-key cryptography / Date: received 15 Oct 2007, last revised 7 Jul 2008 Contact author: bwaters at csl sri com Available format(s): PDF | BibTeX Citation Version: 20080708:003105 (All versions of this report) Short URL: ia.cr/2007/404 Discussion forum: Show discussion | Start new discussion