Cryptanalysis and improvement of an encoding method for private-key hidden vector encryptions

Fu Kuo Tseng, Rong-Jaye Chen

Research output: Contribution to journalArticlepeer-review


A predicate encryption scheme enables the owner of the master key to enforce fine-grained access control on encrypted cloud data through the delegation of predicate tokens to cloud storages. In particular, Blundo et al. proposed a construction where a predicate token reveals partial information of the involved to enable efficient operations on encrypted . However, we found that a predicate token reveals more information than what was claimed because of the encoding scheme. In this letter, we not only analyze this extra information leakage but also present an improved encoding scheme for the Blundo et al's scheme and the other similar schemes to preserve predicate privacy.

Original languageEnglish
Pages (from-to)1982-1984
Number of pages3
JournalIEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
Issue number9
StatePublished - 1 Sep 2015


  • Cloud storage
  • Hidden vector encryption scheme
  • Predicate privacy
  • Symmetric predicate encryption scheme
  • Vector encoding

Fingerprint Dive into the research topics of 'Cryptanalysis and improvement of an encoding method for private-key hidden vector encryptions'. Together they form a unique fingerprint.

Cite this