More Efficient Constructions for Inner-Product Encryption

Somindu Ramanna 1, 2
2 ARIC - Arithmetic and Computing
Inria Grenoble - Rhône-Alpes, LIP - Laboratoire de l'Informatique du Parallélisme
Abstract : We propose new constructions for inner product encryption – IPE1 and IPE2, both secure under the eXternal Diffie-Hellman assumption (SXDH) in asymmetric pairing groups. The first scheme has constant-size ciphertexts whereas the second one is weakly attribute hiding. IPE2 is derived from the identity-based encryption scheme of Jutla Roy (Asiacrypt 2013), that was extended from tag-based quasi-adaptive non-interactive zero-knowledge (QA-NIZK) proofs for linear subspaces of vector spaces over bilinear groups. The verifier common reference string (CRS) in these tag-based systems are split into two parts, that are combined during verification. We consider an alternate form of the tag-based QA-NIZK proof with a single verifier CRS that already includes a tag, different from the one defining the language. The verification succeeds as long as the two tags are unequal. Essentially, we embed a two-equation revocation mechanism in the verification. The new QA-NIZK proof system leads to IPE1, a constant-sized ciphertext IPE scheme with very short ciphertexts. Both the IPE schemes are obtained by applying the n-equation revocation technique of Attrapadung and Libert (PKC 2010) to the corresponding identity based encryption schemes and proved secure under SXDH assumption. As an application, we show how our schemes can be specialised to obtain the first fully secure identity-based broadcast encryption based on SXDH with a trade-off among the public parameters , ciphertext and key sizes, all of them being sub-linear in the maximum number of recipients of a broadcast.
Type de document :
Communication dans un congrès
Applied Cryptography and Network Security (ACNS 2016), Jun 2016, Guildford, United Kingdom. Springer, 9696, pp.231 - 248, 2016, Applied Cryptography and Network Security (ACNS 2016). 〈http://acns2016.sccs.surrey.ac.uk/〉. 〈10.1007/978-3-319-39555-5_13〉
Liste complète des métadonnées

https://hal.inria.fr/hal-01394288
Contributeur : Benoit Libert <>
Soumis le : mercredi 9 novembre 2016 - 10:18:15
Dernière modification le : vendredi 20 avril 2018 - 15:44:26
Document(s) archivé(s) le : mardi 14 mars 2017 - 22:55:57

Fichier

356.pdf
Fichiers produits par l'(les) auteur(s)

Identifiants

Collections

Citation

Somindu Ramanna. More Efficient Constructions for Inner-Product Encryption. Applied Cryptography and Network Security (ACNS 2016), Jun 2016, Guildford, United Kingdom. Springer, 9696, pp.231 - 248, 2016, Applied Cryptography and Network Security (ACNS 2016). 〈http://acns2016.sccs.surrey.ac.uk/〉. 〈10.1007/978-3-319-39555-5_13〉. 〈hal-01394288〉

Partager

Métriques

Consultations de la notice

90

Téléchargements de fichiers

102