A New Functional Encryption for Multidimensional Range Query (Short Paper)

被引:0
|
作者
Xu, Jia [1 ]
Chang, Ee-Chien [2 ]
Zhou, Jianying [3 ]
机构
[1] Singapore Telecommun Ltd, Singapore, Singapore
[2] Natl Univ Singapore, Singapore, Singapore
[3] Singapore Univ Technol & Design, Singapore, Singapore
基金
新加坡国家研究基金会;
关键词
Functional encryption; Multidimensional range query; Polymorphic property; IDENTITY-BASED ENCRYPTION;
D O I
10.1007/978-3-319-72359-4_21
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Functional encryption, which emerges in the community recently, is a generalized concept of traditional encryption (e.g. RSA and AES). In traditional encryption scheme, decrypting a ciphertext with a correct decryption key will output the original plaintext associated to the ciphertext. In contrast, in functional encryption scheme, decrypting a ciphertext with a correct decryption key will output a value that is derived from both the plaintext and the decryption key, and the decryption output would change when different correct decryption key is used to decrypt the same ciphertext. We propose a new functional encryption scheme for multidimensional range query. Given a ciphertext that is the encryption of some secret plaintext under a public attribute (a multidimensional point), and a decryption key corresponding to a query range and a function key. If the public attribute point is within the query range, a user is able to decrypt the ciphertext with the decryption key to obtain a value, which is the output of a pre-defined one-way function with the secret plaintext and the function key as input. In comparison, in previous functional encryption for range query, a decryption will simply output the original secret plaintext when the attribute point is within the query range.
引用
收藏
页码:361 / 372
页数:12
相关论文
共 50 条
  • [1] A Range Key Query Scheme for Multidimensional Databases
    Hasan, K. M. Azharul
    Tsuji, Tatsuo
    Higuchi, Ken
    PROCEEDINGS OF ICECE 2008, VOLS 1 AND 2, 2008, : 958 - 963
  • [2] Processing of Multidimensional Range Query Using SIMD Instructions
    Chovanec, Peter
    Kratky, Michal
    INFORMATICS ENGINEERING AND INFORMATION SCIENCE, PT IV, 2011, 254 : 223 - 237
  • [3] A tunable, efficient, specialized multidimensional range query algorithm
    Cook, Randall
    Cremer, Markus
    2006 IEEE INTERNATIONAL SYMPOSIUM ON SIGNAL PROCESSING AND INFORMATION TECHNOLOGY, VOLS 1 AND 2, 2006, : 397 - +
  • [4] Efficient multidimensional range key query by dimension transformation
    Rimi, Rejwana Tasnim
    Hasan, K. M. Azharul
    2020 IEEE REGION 10 SYMPOSIUM (TENSYMP) - TECHNOLOGY FOR IMPACTFUL SUSTAINABLE DEVELOPMENT, 2020, : 1241 - 1244
  • [5] An Efficient Indexing Structure for Multidimensional Categorical Range Aggregation Query
    Yang, Jian
    Zhao, Chongchong
    Li, Chao
    Xing, Chunxiao
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2019, 13 (02): : 597 - 618
  • [6] Multidimensional Range Query on Outsourced Database with Strong Privacy Guarantee
    Do, Hoang Giang
    Ng, Wee Keong
    2016 14TH ANNUAL CONFERENCE ON PRIVACY, SECURITY AND TRUST (PST), 2016,
  • [7] Evaluation of Query Transformations without Data Short paper
    David, Jerome
    Euzenat, Jerome
    Geneves, Pierre
    Layaida, Nabil
    COMPANION PROCEEDINGS OF THE WORLD WIDE WEB CONFERENCE 2018 (WWW 2018), 2018, : 1599 - 1602
  • [8] Approach for Constructing Public Key Encryption with Multi-Dimensional Range Query
    Zhang, Yu
    Lu, Songfeng
    Zhao, Hua
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2015, E98A (02): : 754 - 757
  • [9] PMRQ: Achieving Efficient and Privacy-Preserving Multidimensional Range Query in eHealthcare
    Zheng, Yandong
    Lu, Rongxing
    Zhang, Songnian
    Guan, Yunguo
    Shao, Jun
    Wang, Fengwei
    Zhu, Hui
    IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (18) : 17468 - 17479
  • [10] Multidimensional Range Query and Load Balancing in Wireless ad hoc and Sensor Networks
    Monti, Cabriele
    Moro, Gianluca
    P2P'08: EIGHTH INTERNATIONAL CONFERENCE ON PEER-TO-PEER COMPUTING, PROCEEDINGS, 2008, : 205 - 214