A privacy-preserving encoding for efficient comparison queries and access control from predicate encryption

Shao Heng Chen, Fu Kuo Tseng, Rong-Jaye Chen

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

1 Scopus citations

Abstract

A hidden vector encryption (HVE) scheme, one type of predicate encryption schemes, can support comparison predicates on encrypted keywords through encrypted predicates by pairing transformed keyword vectors with predicate vectors. However, the length of these vectors grows in proportion to the size of the keyword space and so does the system complexity. In this paper, we provide a privacy-preserving encoding for efficient comparison queries, where the length of the vectors and the system complexity is only logarithmically proportional to the size of the keyword space. In addition, our encoding integrates a HVE scheme and a ciphertext-policy attribute based encryption (CPABE) scheme. This integration provides not only the access control based on the searchable keywords but also balanced overheads among encryption, key generation and query for both computation and storage overheads.

Original languageEnglish
Title of host publicationIntelligent Systems and Applications - Proceedings of the International Computer Symposium, ICS 2014
EditorsWilliam Cheng-Chung Chu, Stephen Jenn-Hwa Yang, Han-Chieh Chao
PublisherIOS Press
Pages788-797
Number of pages10
ISBN (Electronic)9781614994831
DOIs
StatePublished - 1 Jan 2015
EventInternational Computer Symposium, ICS 2014 - Taichung, Taiwan
Duration: 12 Dec 201414 Dec 2014

Publication series

NameFrontiers in Artificial Intelligence and Applications
Volume274
ISSN (Print)0922-6389

Conference

ConferenceInternational Computer Symposium, ICS 2014
CountryTaiwan
CityTaichung
Period12/12/1414/12/14

Keywords

  • ciphertext-policy attribute based encryption
  • comparison predicate
  • encoding
  • hidden vector encryption
  • query and access control

Fingerprint Dive into the research topics of 'A privacy-preserving encoding for efficient comparison queries and access control from predicate encryption'. Together they form a unique fingerprint.

Cite this