Verifiable Predicate Encryption and Applications to CCA Security and Anonymous Predicate Authentication

被引:0
|
作者
Yamada, Shota [1 ]
Attrapadung, Nuttapong [2 ]
Santoso, Bagus [3 ]
Schuldt, Jacob C. N. [2 ]
Hanaoka, Goichiro [2 ]
Kunihiro, Noboru [1 ]
机构
[1] Univ Tokyo, Tokyo, Japan
[2] Natl Inst Adv Ind Sci & Technol, Tokyo, Japan
[3] Inst Infocomm Res, Singapore, Singapore
来源
关键词
IDENTITY-BASED ENCRYPTION; DUAL SYSTEM ENCRYPTION; FUNCTIONAL ENCRYPTION; BROADCAST ENCRYPTION; EFFICIENT; KNOWLEDGE; CIPHERTEXTS; PROOFS; HIBE;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we focus on verifiability of predicate encryption. A verifiable predicate encryption scheme guarantees that all legitimate receivers of a ciphertext will obtain the same message upon decryption. While verifiability of predicate encryption might be a desirable property by itself, we furthermore show that this property enables interesting applications. Specifically, we provide two applications of verifiable predicate encryption. Firstly, we show that for a large class of verifiable predicate encryption schemes, it is always possible to convert a chosen-plaintext secure scheme into a chosen-ciphertext secure one. Secondly, we show that a verifiable predicate encryption scheme allows the construction of a deniable predicate authentication scheme. This primitive enables a user to authenticate a message to a verifier using a private key satisfying a specified relation while at the same time allowing the user to deny ever having interacted with the verifier. This scheme furthermore guarantees the anonymity of the user in the sense that the verifier will learn nothing about the user's private key except that it satisfies the specified relation. Lastly, we show that many currently known predicate encryption schemes already provide verifiability, and furthermore demonstrate that many predicate encryption schemes which do not provide verifiability, can be easily converted into schemes providing verifiability. Our results not only highlight that verifiability is a very useful property of predicate encryption, but also show that efficient and practical schemes with this property can be obtained relatively easily.
引用
收藏
页码:243 / 261
页数:19
相关论文
共 50 条
  • [1] Generic Construction of Publicly Verifiable Predicate Encryption
    Tan, Chuting
    jiang, Zoe L.
    Wang, Xuan
    Yiu, S. M.
    Fang, Junbin
    Li, Jin
    Jin, Yabin
    Huang, Jiajun
    ASIA CCS'16: PROCEEDINGS OF THE 11TH ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2016, : 889 - 894
  • [2] Subset Predicate Encryption and Its Applications
    Katz, Jonathan
    Maffei, Matteo
    Malavolta, Giulio
    Schroder, Dominique
    CRYPTOLOGY AND NETWORK SECURITY (CANS 2017), 2018, 11261 : 115 - 134
  • [3] Verifiable Certificates for Predicate Subtyping
    Gilbert, Frederic
    PROGRAMMING LANGUAGES AND SYSTEMS, ESOP 2019: 28TH EUROPEAN SYMPOSIUM ON PROGRAMMING, 2019, 11423 : 440 - 466
  • [4] On the Security of PAS (Predicate-based Authentication Service)
    Li, Shujun
    Asghar, Hassan Jameel
    Pieprzyk, Josef
    Sadeghi, Ahmad-Reza
    Schmitz, Roland
    Wang, Huaxiong
    25TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, 2009, : 209 - +
  • [5] Practical Functional Encryption for Quadratic Functions with Applications to Predicate Encryption
    Baltico, Carmen Elisabetta Zaira
    Catalano, Dario
    Fiore, Dario
    Gay, Romain
    ADVANCES IN CRYPTOLOGY - CRYPTO 2017, PT I, 2017, 10401 : 67 - 98
  • [6] Verifiability-based conversion from CPA to CCA-secure predicate encryption
    Nandi, Mridul
    Pandit, Tapas
    APPLICABLE ALGEBRA IN ENGINEERING COMMUNICATION AND COMPUTING, 2018, 29 (01) : 77 - 102
  • [7] Predicate Privacy in Encryption Systems
    Shen, Emily
    Shi, Elaine
    Waters, Brent
    THEORY OF CRYPTOGRAPHY, 6TH THEORY OF CRYPTOGRAPHY CONFERENCE, TCC 2009, 2009, 5444 : 457 - +
  • [8] Verifiability-based conversion from CPA to CCA-secure predicate encryption
    Mridul Nandi
    Tapas Pandit
    Applicable Algebra in Engineering, Communication and Computing, 2018, 29 : 77 - 102
  • [9] Security Verification of an Authentication Algorithm Based on Verifiable Encryption
    Kihara, Maki
    Iriyama, Satoshi
    INFORMATION, 2023, 14 (02)
  • [10] Realizing Chosen Ciphertext Security Generically in Attribute-Based Encryption and Predicate Encryption
    Koppula, Venkata
    Waters, Brent
    ADVANCES IN CRYPTOLOGY - CRYPTO 2019, PT II, 2019, 11693 : 671 - 700