eprint.iacr.org will be offline for approximately an hour for routine maintenance again at 10pm UTC on Wednesday, April 17.

Paper 2017/453

Subtleties in Security Definitions for Predicate Encryption with Public Index

Johannes Blömer and Gennadij Liske


We take a critical look at established security definitions for predicate encryption (PE) with public index under chosen-plaintext attack (CPA) and under chosen-ciphertext attack (CCA). In contrast to conventional public-key encryption (PKE), security definitions for PE have to deal with user collusion which is modeled by an additional key generation oracle. We identify three different formalizations of key handling in the literature implicitly assumed to lead to the same security notion. Contrary to this assumption we prove that the corresponding models result in two different security notions under CPA and three different security notions under CCA. Similarly to the recent results for PKE and conventional key-encapsulation mechanism (KEM) (Journal of Cryptology, 2015) we also analyze subtleties in security definitions for PE and predicate key-encapsulation mechanism (P-KEM) regarding the so-called "no-challenge-decryption" condition. While the results for PE and PKE are similar, the results for P-KEM significantly differ from the corresponding results for conventional KEM. Our analysis is based on appropriate definitions of semantic security and indistinguishability of encryptions for PE under different attacks scenarios. These definitions complement related security definitions for identity-based encryption and functional encryption. As a result of our work we suggest security definitions for PE and P-KEM under different attack scenarios.

Available format(s)
Public-key cryptography
Publication info
Preprint. MINOR revision.
predicate encryption with public indexpredicate key-encapsulation mechanismsemantic security definitionindistinguishability definitionchosen-plaintext attackchosen-ciphertext attack
Contact author(s)
gennadij liske @ upb de
2017-05-25: received
Short URL
Creative Commons Attribution


      author = {Johannes Blömer and Gennadij Liske},
      title = {Subtleties in Security Definitions for Predicate Encryption with Public Index},
      howpublished = {Cryptology ePrint Archive, Paper 2017/453},
      year = {2017},
      note = {\url{https://eprint.iacr.org/2017/453}},
      url = {https://eprint.iacr.org/2017/453}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.