Abstract
Recently, Hamburg improved the notion of spatial encryption by presenting a variant called doubly-spatial encryption. As a generalization of the spatial encryption, the doubly-spatial encryption is more powerful and expressive. More useful cryptography systems can be built from it, such as attribute-based encryption, etc. However, the only presented doubly-spatial encryption scheme can only be proved to be selectively secure.
In this paper, we primarily focus on the full security of doubly-spatial encryption. A doubly-spatial encryption scheme has been proposed. We apply the dual system methodology proposed by Waters in the security proof. Our scheme can be proved adaptively secure under standard assumptions, the decisional linear assumption and the decisional bilinear Diffe-Hellman assumption, over prime order groups in the standard model. Our scheme is the first fully secure construction of doubly-spatial encryption. As an independent interest, we also propose a fully secure spatial encryption with weak anonymity and constant ciphertext size in the composite order group settings.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Boneh, D., Hamburg, M.: Generalized Identity Based and Broadcast Encryption Schemes. In: Pieprzyk, J. (ed.) ASIACRYPT 2008. LNCS, vol. 5350, pp. 455–470. Springer, Heidelberg (2008)
De Caro, A., Iovino, V., Persiano, G.: Fully Secure Anonymous HIBE and Secret-Key Anonymous IBE with Short Ciphertexts. In: Joye, M., Miyaji, A., Otsuka, A. (eds.) Pairing 2010. LNCS, vol. 6487, pp. 347–366. Springer, Heidelberg (2010)
Chen, J., Lim, H. W., Ling, S., Wang, H.: Fully Secure Spatial Encryption under Simple Assumptions with Constant-Size Ciphertexts. IACR Cryptology ePrint Archive 2011:650 (2011)
Chen, J., Lim, H.W., Ling, S., Wang, H.: The Relation and Transformation between Hierarchical Inner Product Encryption and Spatial Encryption. IACR Cryptology ePrint Archive 2011:455 (2011)
Delerablée, C., Pointcheval, D.: Dynamic Threshold Public-Key Encryption. In: Wagner, D. (ed.) CRYPTO 2008. LNCS, vol. 5157, pp. 317–334. Springer, Heidelberg (2008)
Goyal, V., Pandey, O., Sahai, A., Waters, B.: Attribute-based encryption for fine-grained access conrol of encrypted data. In: ACM Conference on Computer and Communications Security, ACM CCS (2006)
Hamburg, M.: Spatial encryption. IACR Cryptology ePrint Archive 2011:389
Lewko, A., Okamoto, T., Sahai, A., Takashima, K., Waters, B.: Fully Secure Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner Product Encryption. In: Gilbert, H. (ed.) EUROCRYPT 2010. LNCS, vol. 6110, pp. 62–91. Springer, Heidelberg (2010)
Lewko, A., Sahai, A., Waters, B.: Revocation systems with very small private keys. In: IEEE Symposium on Security and Privacy 2010, pp. 273–285 (2010)
Lewko, A., Waters, B.: New Techniques for Dual System Encryption and Fully Secure HIBE with Short Ciphertexts. In: Micciancio, D. (ed.) TCC 2010. LNCS, vol. 5978, pp. 455–479. Springer, Heidelberg (2010)
Moriyama, D., Doi, H.: A fully secure spatial encryption scheme. IEICE Transactions 94-A(1), 28–35 (2011)
Okamoto, T., Takashima, K.: Fully Secure Functional Encryption with General Relations from the Decisional Linear Assumption. In: Rabin, T. (ed.) CRYPTO 2010. LNCS, vol. 6223, pp. 191–208. Springer, Heidelberg (2010)
Sahai, A., Waters, B.: Fuzzy Identity-Based Encryption. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 457–473. Springer, Heidelberg (2005)
Waters, B.: Dual System Encryption: Realizing Fully Secure IBE and HIBE under Simple Assumptions. In: Halevi, S. (ed.) CRYPTO 2009. LNCS, vol. 5677, pp. 619–636. Springer, Heidelberg (2009)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Chen, C., Zhang, Z., Feng, D. (2012). Fully Secure Doubly-Spatial Encryption under Simple Assumptions. In: Takagi, T., Wang, G., Qin, Z., Jiang, S., Yu, Y. (eds) Provable Security. ProvSec 2012. Lecture Notes in Computer Science, vol 7496. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-33272-2_16
Download citation
DOI: https://doi.org/10.1007/978-3-642-33272-2_16
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-33271-5
Online ISBN: 978-3-642-33272-2
eBook Packages: Computer ScienceComputer Science (R0)