ISSN 1000-1239 CN 11-1777/TP

计算机研究与发展 ›› 2015, Vol. 52 ›› Issue (3): 691-701.doi: 10.7544/issn1000-1239.2015.20131413

• 信息安全 • 上一篇    下一篇



  1. (解放军信息工程大学 郑州 450001) (数学工程与先进计算国家重点实验室 郑州 450001) (
  • 出版日期: 2015-03-01
  • 基金资助: 

Fully Secure Hierarchical Inner Product Encryption with Constant-Size Ciphertexts

Zhang Jie, Ge Aijun, Ma Chuangui   

  1. (PLA Information Engineering University, Zhengzhou 450001) (State Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou 450001)
  • Online: 2015-03-01

摘要: 分层内积加密方案为内积加密体制提供了私钥分发功能,可有效降低系统根节点的任务量.针对现有分层内积加密方案密文长度过长的问题,首先提出一个完全安全且固定密文长度的内积加密方案,并以该方案为基础,构造了一个新的分层内积加密方案,利用对偶系统加密的新技术,在标准模型下证明了该分层内积加密方案是完全安全的.新方案密文长度达到了固定值,并且解密时只需要7个双线性对运算.与现有方案比,新方案计算效率高,且易于实现,占用通信带宽低,具有一定的优势.

关键词: 分层内积加密, 对偶系统加密, 固定密文长度, 完全安全, 标准模型

Abstract: Inner product encryption (IPE) is a concrete construction of predicate encryption, which represents a wide class of predicates that includes an equality test(for identity-based encryption and hidden vector encryption), disjunctions or conjunctions of equality tests (for attribute-based encryption). Hierarchical inner product encryption (HIPE) can provide the capacity of delegate for inner product encryption, and it can effectively reduce the workload of root node of the system. Aiming at the efficiency that exists in the hierarchical inner product encryption, we present a short ciphertexts IPE scheme with full security in asymmetric bilinear pairing. By making use of the IPE scheme as building blocks, we then present a new HIPE scheme with the new technique for dual system encryption. The new realization of dual system encryption does not use tags, which makes the compression of ciphertexts possible. The proposed HIPE scheme achieves constant-size ciphertexts and full security in the standard model. Security is proven under three static assumptions whose size does not depend on the number of queries. Furthermore, our scheme achieves lower computational cost because decryption only needs seven pairing operations. Compared with other existing schemes, our scheme is more compact to implement and can provide better efficiency in terms of the communication and computation cost.

Key words: hierarchical inner product encryption, dual system encryption, constant-size ciphertexts, full security, standard model