Skip to main content

Fully Secure Doubly-Spatial Encryption under Simple Assumptions

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 7496))

Abstract

Recently, Hamburg improved the notion of spatial encryption by presenting a variant called doubly-spatial encryption. As a generalization of the spatial encryption, the doubly-spatial encryption is more powerful and expressive. More useful cryptography systems can be built from it, such as attribute-based encryption, etc. However, the only presented doubly-spatial encryption scheme can only be proved to be selectively secure.

In this paper, we primarily focus on the full security of doubly-spatial encryption. A doubly-spatial encryption scheme has been proposed. We apply the dual system methodology proposed by Waters in the security proof. Our scheme can be proved adaptively secure under standard assumptions, the decisional linear assumption and the decisional bilinear Diffe-Hellman assumption, over prime order groups in the standard model. Our scheme is the first fully secure construction of doubly-spatial encryption. As an independent interest, we also propose a fully secure spatial encryption with weak anonymity and constant ciphertext size in the composite order group settings.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Boneh, D., Hamburg, M.: Generalized Identity Based and Broadcast Encryption Schemes. In: Pieprzyk, J. (ed.) ASIACRYPT 2008. LNCS, vol. 5350, pp. 455–470. Springer, Heidelberg (2008)

    Chapter  Google Scholar 

  2. De Caro, A., Iovino, V., Persiano, G.: Fully Secure Anonymous HIBE and Secret-Key Anonymous IBE with Short Ciphertexts. In: Joye, M., Miyaji, A., Otsuka, A. (eds.) Pairing 2010. LNCS, vol. 6487, pp. 347–366. Springer, Heidelberg (2010)

    Chapter  Google Scholar 

  3. Chen, J., Lim, H. W., Ling, S., Wang, H.: Fully Secure Spatial Encryption under Simple Assumptions with Constant-Size Ciphertexts. IACR Cryptology ePrint Archive 2011:650 (2011)

    Google Scholar 

  4. Chen, J., Lim, H.W., Ling, S., Wang, H.: The Relation and Transformation between Hierarchical Inner Product Encryption and Spatial Encryption. IACR Cryptology ePrint Archive 2011:455 (2011)

    Google Scholar 

  5. Delerablée, C., Pointcheval, D.: Dynamic Threshold Public-Key Encryption. In: Wagner, D. (ed.) CRYPTO 2008. LNCS, vol. 5157, pp. 317–334. Springer, Heidelberg (2008)

    Google Scholar 

  6. Goyal, V., Pandey, O., Sahai, A., Waters, B.: Attribute-based encryption for fine-grained access conrol of encrypted data. In: ACM Conference on Computer and Communications Security, ACM CCS (2006)

    Google Scholar 

  7. Hamburg, M.: Spatial encryption. IACR Cryptology ePrint Archive 2011:389

    Google Scholar 

  8. Lewko, A., Okamoto, T., Sahai, A., Takashima, K., Waters, B.: Fully Secure Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner Product Encryption. In: Gilbert, H. (ed.) EUROCRYPT 2010. LNCS, vol. 6110, pp. 62–91. Springer, Heidelberg (2010)

    Chapter  Google Scholar 

  9. Lewko, A., Sahai, A., Waters, B.: Revocation systems with very small private keys. In: IEEE Symposium on Security and Privacy 2010, pp. 273–285 (2010)

    Google Scholar 

  10. Lewko, A., Waters, B.: New Techniques for Dual System Encryption and Fully Secure HIBE with Short Ciphertexts. In: Micciancio, D. (ed.) TCC 2010. LNCS, vol. 5978, pp. 455–479. Springer, Heidelberg (2010)

    Chapter  Google Scholar 

  11. Moriyama, D., Doi, H.: A fully secure spatial encryption scheme. IEICE Transactions 94-A(1), 28–35 (2011)

    Google Scholar 

  12. Okamoto, T., Takashima, K.: Fully Secure Functional Encryption with General Relations from the Decisional Linear Assumption. In: Rabin, T. (ed.) CRYPTO 2010. LNCS, vol. 6223, pp. 191–208. Springer, Heidelberg (2010)

    Google Scholar 

  13. Sahai, A., Waters, B.: Fuzzy Identity-Based Encryption. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 457–473. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  14. Waters, B.: Dual System Encryption: Realizing Fully Secure IBE and HIBE under Simple Assumptions. In: Halevi, S. (ed.) CRYPTO 2009. LNCS, vol. 5677, pp. 619–636. Springer, Heidelberg (2009)

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Chen, C., Zhang, Z., Feng, D. (2012). Fully Secure Doubly-Spatial Encryption under Simple Assumptions. In: Takagi, T., Wang, G., Qin, Z., Jiang, S., Yu, Y. (eds) Provable Security. ProvSec 2012. Lecture Notes in Computer Science, vol 7496. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-33272-2_16

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-33272-2_16

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-33271-5

  • Online ISBN: 978-3-642-33272-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics