Paper 2011/546

Hidden Vector Encryption Fully Secure Against Unrestricted Queries

Angelo De Caro, Vincenzo Iovino, and Giuseppe Persiano

Abstract

Predicate encryption is an important cryptographic primitive (see \cite{BDOP04,BoWa07,Goyal06,KaSaWa08}) that enables fine-grained control on the decryption keys. Roughly speaking, in a predicate encryption scheme the owner of the master secret key \MSK can derive secret key \SKP, for any predicate P from a specified class of predicates P. In encrypting a message M, the sender can specify an {\em attribute} vector \x and the resulting ciphertext X~ can be decrypted only by using keys \SKP such that P(\x)=1. Our main contribution is the {\em first} construction of a predicate encryption scheme that can be proved {\em fully} secure against {\em unrestricted} queries by probabilistic polynomial-time adversaries under non-interactive constant sized (that is, independent of the length of the attribute vectors) hardness assumptions on bilinear groups of composite order. Specifically, we consider {\em hidden vector encryption} (HVE in short), a notable case of predicate encryption introduced by Boneh and Waters \cite{BoWa07} and further developed in \cite{ShWa08, IoPe08, SLNHJ10}. In a HVE scheme, the ciphertext attributes are vectors of length over alphabet , keys are associated with vectors of length over alphabet and we consider the predicate which is true if and only if, for all , implies . Previous constructions restricted the proof of security to adversaries that could ask only {\em non-matching} queries; that is, for challenge attribute vectors and , the adversary could ask only for keys of vectors for which false. Our proof employs the dual system methodology of Waters \cite{Waters09}, that gave one of the first fully secure construction in this area, blended with a careful design of intermediate security games that keep into account the relationship between challenge ciphertexts and key queries.

Metadata
Available format(s)
PDF
Category
Public-key cryptography
Publication info
Published elsewhere. Unknown where it was published
Keywords
predicate encryptionfull securitypairing-based cryptography
Contact author(s)
decaro @ dia unisa it
History
2011-10-11: received
Short URL
https://ia.cr/2011/546
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2011/546,
      author = {Angelo De Caro and Vincenzo Iovino and Giuseppe Persiano},
      title = {Hidden Vector Encryption Fully Secure Against Unrestricted Queries},
      howpublished = {Cryptology {ePrint} Archive, Paper 2011/546},
      year = {2011},
      url = {https://eprint.iacr.org/2011/546}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.