An Efficient Predicate Encryption with Constant Pairing Computations and Minimum Costs
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Kim, Intae | - |
dc.contributor.author | Hwang, Seong Oun | - |
dc.contributor.author | Park, Jong Hwan | - |
dc.contributor.author | Park, Chanil | - |
dc.date.available | 2020-07-10T05:49:07Z | - |
dc.date.created | 2020-07-06 | - |
dc.date.issued | 2016-10-01 | - |
dc.identifier.issn | 0018-9340 | - |
dc.identifier.uri | https://scholarworks.bwise.kr/hongik/handle/2020.sw.hongik/7346 | - |
dc.description.abstract | Predicate encryption is a public-key encryption that supports attribute-hiding as well as payload-hiding and achieves high flexibility in terms of access control. Since Katz, Sahai, and Waters first proposed the predicate encryption scheme in 2008, several predicate encryption schemes have been published. Unfortunately these are impractical as they require O(n) pairing computations for decryption with considerably large sized public parameters, secret key, and ciphertext, where n is the dimension of the attribute/predicate vectors. In this paper, we propose a very efficient predicate encryption scheme that requires only n exponentiation plus three pairing computations for decryption with shorter sized public parameters, secret key, and ciphertext. The proposed scheme is proven selective attribute-secure against chosen-plaintext attacks in the standard model under the Asymmetric Decisional Bilinear Diffie-Hellman assumptions. | - |
dc.language | 영어 | - |
dc.language.iso | en | - |
dc.publisher | IEEE COMPUTER SOC | - |
dc.subject | BROADCAST ENCRYPTION | - |
dc.subject | SCHEME | - |
dc.title | An Efficient Predicate Encryption with Constant Pairing Computations and Minimum Costs | - |
dc.type | Article | - |
dc.contributor.affiliatedAuthor | Hwang, Seong Oun | - |
dc.identifier.doi | 10.1109/TC.2016.2526000 | - |
dc.identifier.scopusid | 2-s2.0-84987668870 | - |
dc.identifier.wosid | 000384131200001 | - |
dc.identifier.bibliographicCitation | IEEE TRANSACTIONS ON COMPUTERS, v.65, no.10, pp.2947 - 2958 | - |
dc.relation.isPartOf | IEEE TRANSACTIONS ON COMPUTERS | - |
dc.citation.title | IEEE TRANSACTIONS ON COMPUTERS | - |
dc.citation.volume | 65 | - |
dc.citation.number | 10 | - |
dc.citation.startPage | 2947 | - |
dc.citation.endPage | 2958 | - |
dc.type.rims | ART | - |
dc.type.docType | Article | - |
dc.description.journalClass | 1 | - |
dc.description.journalRegisteredClass | scie | - |
dc.description.journalRegisteredClass | scopus | - |
dc.relation.journalResearchArea | Computer Science | - |
dc.relation.journalResearchArea | Engineering | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Hardware & Architecture | - |
dc.relation.journalWebOfScienceCategory | Engineering, Electrical & Electronic | - |
dc.subject.keywordPlus | BROADCAST ENCRYPTION | - |
dc.subject.keywordPlus | SCHEME | - |
dc.subject.keywordAuthor | Predicate encryption | - |
dc.subject.keywordAuthor | inner product encryption | - |
dc.subject.keywordAuthor | payload | - |
dc.subject.keywordAuthor | hiding | - |
dc.subject.keywordAuthor | attribute-hiding | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
94, Wausan-ro, Mapo-gu, Seoul, 04066, Korea02-320-1314
COPYRIGHT 2020 HONGIK UNIVERSITY. ALL RIGHTS RESERVED.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.