TY - GEN
T1 - A privacy-preserving encoding for efficient comparison queries and access control from predicate encryption
AU - Chen, Shao Heng
AU - Tseng, Fu Kuo
AU - Chen, Rong-Jaye
PY - 2015/1/1
Y1 - 2015/1/1
N2 - A hidden vector encryption (HVE) scheme, one type of predicate encryption schemes, can support comparison predicates on encrypted keywords through encrypted predicates by pairing transformed keyword vectors with predicate vectors. However, the length of these vectors grows in proportion to the size of the keyword space and so does the system complexity. In this paper, we provide a privacy-preserving encoding for efficient comparison queries, where the length of the vectors and the system complexity is only logarithmically proportional to the size of the keyword space. In addition, our encoding integrates a HVE scheme and a ciphertext-policy attribute based encryption (CPABE) scheme. This integration provides not only the access control based on the searchable keywords but also balanced overheads among encryption, key generation and query for both computation and storage overheads.
AB - A hidden vector encryption (HVE) scheme, one type of predicate encryption schemes, can support comparison predicates on encrypted keywords through encrypted predicates by pairing transformed keyword vectors with predicate vectors. However, the length of these vectors grows in proportion to the size of the keyword space and so does the system complexity. In this paper, we provide a privacy-preserving encoding for efficient comparison queries, where the length of the vectors and the system complexity is only logarithmically proportional to the size of the keyword space. In addition, our encoding integrates a HVE scheme and a ciphertext-policy attribute based encryption (CPABE) scheme. This integration provides not only the access control based on the searchable keywords but also balanced overheads among encryption, key generation and query for both computation and storage overheads.
KW - ciphertext-policy attribute based encryption
KW - comparison predicate
KW - encoding
KW - hidden vector encryption
KW - query and access control
UR - http://www.scopus.com/inward/record.url?scp=84926506327&partnerID=8YFLogxK
U2 - 10.3233/978-1-61499-484-8-788
DO - 10.3233/978-1-61499-484-8-788
M3 - Conference contribution
AN - SCOPUS:84926506327
T3 - Frontiers in Artificial Intelligence and Applications
SP - 788
EP - 797
BT - Intelligent Systems and Applications - Proceedings of the International Computer Symposium, ICS 2014
A2 - Chu, William Cheng-Chung
A2 - Yang, Stephen Jenn-Hwa
A2 - Chao, Han-Chieh
PB - IOS Press
Y2 - 12 December 2014 through 14 December 2014
ER -