scispace - formally typeset
Search or ask a question

Showing papers on "Plaintext-aware encryption published in 2020"


Journal ArticleDOI
TL;DR: This work presents new ciphertext policy attribute based encryption with fast keyword search constructions, which preserve the fine-grained access control inherited from the ABE system while supporting hidden policy and fast keywords search.
Abstract: ABKS has drawn much attention from research and industry in recent years, an ABKS scheme is an encryption scheme that supports keyword search and access control. Attribute-Based Encryption is a public key encryption that enables users to encrypt and decrypt message based on attributes. In a typical implementation, the size of the ciphertext is proportional to the number of attributes associated with it and the decryption time is proportional to the number of attributes used during decryption. Inherit from ABE technology, the computation cost and ciphertext size in most ABKS schemes grow with the complexity of the access policy. On the other hand, we found that the traditional ABKS schemes cannot resist our secret-key-recovery attack. To deal with the above problems, we present new ciphertext policy attribute based encryption with fast keyword search constructions. Our constructions preserve the fine-grained access control inherited from the ABE system while supporting hidden policy and fast keyword search. Our constructions feature multi-value-independent compared with the existing attribute based searchable encryption schemes. The performance analysis demonstrates the efficiency of our constructions. We offer rigorous security proof of our second scheme, which is IND-CKA and IND-CPA secure.

48 citations


Book ChapterDOI
01 Apr 2020
TL;DR: Private-key functional encryption enables fine-grained access to symmetrically-encrypted data and up until recently was not known to imply any public-key primitive, demonstrating poor understanding of this extremely-useful primitive.
Abstract: Private-key functional encryption enables fine-grained access to symmetrically-encrypted data. Although private-key functional encryption (supporting an unbounded number of keys and ciphertexts) seems significantly weaker than its public-key variant, its known realizations all rely on public-key functional encryption. At the same time, however, up until recently it was not known to imply any public-key primitive, demonstrating our poor understanding of this extremely-useful primitive.

32 citations