{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,3,29]],"date-time":"2022-03-29T05:46:06Z","timestamp":1648532766703},"reference-count":51,"publisher":"American Institute of Mathematical Sciences (AIMS)","issue":"1","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["AMC"],"published-print":{"date-parts":[[2022]]},"abstract":"<jats:p xml:lang=\"fr\">&lt;p style='text-indent:20px;'&gt;Attrapadung (Eurocrypt 2014) proposed a generic framework for fully (adaptively) CPA-secure predicate encryption (PE) based on a new primitive, called &lt;i&gt;pair encodings&lt;\/i&gt;. Following the CCA conversions of Yamada et al. (PKC 2011, 2012) and Nandi et al. (ePrint Archive: 2015\/457, AAECC 2018), one can have CCA-secure PE from CPA-secure PE if the primitive PE has either verifiability or delegation. These traditional approaches degrade the performance of the resultant CCA-secure PE scheme as compared to the primitive CPA-secure PE. As an alternative, we provide a direct fully secure CCA-construction of PE from the pair encoding scheme. This costs an extra computation of group element in encryption, three extra pairing computations and one re-randomization of key in decryption as compared to the CPA-construction of Attrapadung.&lt;\/p&gt;&lt;p style='text-indent:20px;'&gt;Recently, Bl\u00f6mer et al. (CT-RSA 2016) proposed a direct CCA-secure construction of predicate encryptions from pair encodings. Although they did not use the aforementioned traditional approaches, a sort of verifiability checking is still involved in the CCA-decryption. The number of pairing computations for this checking is nearly equal to the number of paring computations in CPA-decryption. Therefore, the performance of our direct CCA-secure PE is far better than Bl\u00f6mer et al.&lt;\/p&gt;<\/jats:p>","DOI":"10.3934\/amc.2020098","type":"journal-article","created":{"date-parts":[[2020,8,3]],"date-time":"2020-08-03T11:14:21Z","timestamp":1596453261000},"page":"37","source":"Crossref","is-referenced-by-count":0,"title":["Efficient fully CCA-secure predicate encryptions from pair encodings"],"prefix":"10.3934","volume":"16","author":[{"given":"Mridul","family":"Nandi","sequence":"first","affiliation":[]},{"given":"Tapas","family":"Pandit","sequence":"additional","affiliation":[]}],"member":"2321","reference":[{"key":"key-10.3934\/amc.2020098-1","doi-asserted-by":"publisher","unstructured":"N. Attrapadung, Dual system encryption via doubly selective security: Framework, fully secure functional encryption for regular languages, and more, In <i>EUROCRYPT<\/i>, Lecture Notes in Comput. Sci., volume 8441, Springer, 2014,557\u2013577.","DOI":"10.1007\/978-3-642-55220-5_31"},{"key":"key-10.3934\/amc.2020098-2","unstructured":"N. Attrapadung, Fully secure and succinct attribute based encryption for circuits from multi-linear maps, Cryptology ePrint Archive, Report 2014\/772, 2014, <a href=\"http:\/\/eprint.iacr.org\/\" target=\"_blank\">http:\/\/eprint.iacr.org\/<\/a>."},{"key":"key-10.3934\/amc.2020098-3","doi-asserted-by":"publisher","unstructured":"N. Attrapadung and B. Libert, Functional encryption for inner product: Achieving constant-size ciphertexts with adaptive security or support for negation, In <i>PKC<\/i>, Lecture Notes in Comput. Sci., volume 6056, Springer, 2010,384\u2013402.","DOI":"10.1007\/978-3-642-13013-7_23"},{"key":"key-10.3934\/amc.2020098-4","doi-asserted-by":"publisher","unstructured":"N. Attrapadung, B. Libert and E. Panafieu, Expressive key-policy attribute-based encryption with constant-size ciphertexts, In <i>PKC<\/i>, Lecture Notes in Comput. Sci., volume 6571, Springer, 2011, 90\u2013108.","DOI":"10.1007\/978-3-642-19379-8_6"},{"key":"key-10.3934\/amc.2020098-5","doi-asserted-by":"publisher","unstructured":"N. Attrapadung and S. Yamada, Duality in ABE: Converting attribute based encryption for dual predicate and dual policy via computational encodings, In <i>CT-RSA<\/i>, Lecture Notes in Comput. Sci., volume 9048, Springer, 2015, 87\u2013105.","DOI":"10.1007\/978-3-319-16715-2_5"},{"key":"key-10.3934\/amc.2020098-6","doi-asserted-by":"publisher","unstructured":"J. Bl\u00f6mer and G. Liske, Construction of fully cca-secure predicate encryptions from pair encoding schemes, In <i>CT-RSA<\/i>, Lecture Notes in Comput. Sci., volume 9610, Springer, 2016,431\u2013447.","DOI":"10.1007\/978-3-319-29485-8_25"},{"key":"key-10.3934\/amc.2020098-7","doi-asserted-by":"publisher","unstructured":"D. Boneh, R. Canetti, S. Halevi, J. Katz.Chosen-ciphertext security from identity-based encryption, <i>Journal of SIAM<\/i>, <b>36<\/b> (2007), 1301-1328.","DOI":"10.1137\/S009753970544713X"},{"key":"key-10.3934\/amc.2020098-8","doi-asserted-by":"publisher","unstructured":"D. Boneh and M. Franklin, Identity-based encryption from the weil pairing, In <i>CRYPTO<\/i>, Lecture Notes in Comput. Sci., volume 2139, Springer, 2001,213\u2013229.","DOI":"10.1007\/3-540-44647-8_13"},{"key":"key-10.3934\/amc.2020098-9","doi-asserted-by":"publisher","unstructured":"D. Boneh, E. Goh, and K. Nissim, Evaluating 2-dnf formulas on ciphertexts, In <i>TCC<\/i>, Lecture Notes in Comput. Sci., volume 3378, Springer, 2005,325\u2013341.","DOI":"10.1007\/978-3-540-30576-7_18"},{"key":"key-10.3934\/amc.2020098-10","doi-asserted-by":"publisher","unstructured":"D. Boneh and M. Hamburg, Generalized identity-based and broadcast encryption schemes, In <i>ASIACRYPT<\/i>, Lecture Notes in Comput. Sci., volume 5350, Springer, 2008,455\u2013470.","DOI":"10.1007\/978-3-540-89255-7_28"},{"key":"key-10.3934\/amc.2020098-11","doi-asserted-by":"publisher","unstructured":"D. Boneh and J. Katz, Improved efficiency for CCA-secure cryptosystems built using identity-based encryption, In <i>CT-RSA<\/i>, Lecture Notes in Comput. Sci., volume 3376, Springer, 2005, 87\u2013103.","DOI":"10.1007\/978-3-540-30574-3_8"},{"key":"key-10.3934\/amc.2020098-12","doi-asserted-by":"publisher","unstructured":"X. Boyen, Q. Mei and B. Waters, Direct chosen ciphertext security from identity-based techniques, In <i>ACM Conference on Computer and Communications Security<\/i>, ACM, New York, 2005,320\u2013329.","DOI":"10.1145\/1102120.1102162"},{"key":"key-10.3934\/amc.2020098-13","doi-asserted-by":"publisher","unstructured":"R. Canetti, S. Halevi and J. Katz, Chosen-ciphertext security from identity-based encryption, In <i>EUROCRYPT<\/i>, Lecture Notes in Comput. Sci., volume 3027, Springer, 2004,207\u2013222.","DOI":"10.1007\/978-3-540-24676-3_13"},{"key":"key-10.3934\/amc.2020098-14","doi-asserted-by":"publisher","unstructured":"M. Chase, Multi-authority attribute based encryption, In <i>TCC<\/i>, Lecture Notes in Comput. Sci., volume 4392, Springer, 2007,515\u2013534.","DOI":"10.1007\/978-3-540-70936-7_28"},{"key":"key-10.3934\/amc.2020098-15","doi-asserted-by":"publisher","unstructured":"C. Chen, Z. Zhang and D. Feng, Efficient ciphertext policy attribute-based encryption with constant-size ciphertext and constant computation-cost, In <i>PROVSEC<\/i>, Lecture Notes in Comput. Sci., volume 6980, Springer, 2011, 84\u2013101.","DOI":"10.1007\/978-3-642-24316-5_8"},{"key":"key-10.3934\/amc.2020098-16","doi-asserted-by":"publisher","unstructured":"C. Chen, Z. Zhang and D. Feng, Fully secure doubly-spatial encryption under simple assumptions, In <i>PROVSEC<\/i>, Lecture Notes in Comput. Sci., volume 7496, Springer, 2012,253\u2013263.","DOI":"10.1007\/978-3-642-33272-2_16"},{"key":"key-10.3934\/amc.2020098-17","doi-asserted-by":"publisher","unstructured":"J. Chen, H. Wee.Doubly spatial encryption from DBDH, <i>Theoret. Comput. Sci.<\/i>, <b>543<\/b> (2014), 79-89.","DOI":"10.1016\/j.tcs.2014.06.003"},{"key":"key-10.3934\/amc.2020098-18","doi-asserted-by":"publisher","unstructured":"C. Cocks, An identity based encryption scheme based on quadratic residues, In <i>Cryptography and Coding<\/i>, Lecture Notes in Comput. Sci., volume 2260, Springer, 2001,360\u2013363.","DOI":"10.1007\/3-540-45325-3_32"},{"key":"key-10.3934\/amc.2020098-19","doi-asserted-by":"publisher","unstructured":"W. Diffie, M. Hellman.New directions in cryptography, <i>IEEE Transactions on Information Theory<\/i>, <b>22<\/b> (1976), 644-654.","DOI":"10.1109\/tit.1976.1055638"},{"key":"key-10.3934\/amc.2020098-20","doi-asserted-by":"publisher","unstructured":"K. Emura, A. Miyaji, A. Nomura, K. Omote and M. Soshi, A ciphertext-policy attribute-based encryption scheme with constant ciphertext length, In <i>ISPEC<\/i>, Lecture Notes in Comput. Sci., volume 5451, Springer, 2009, 13\u201323.","DOI":"10.1504\/IJACT.2010.033798"},{"key":"key-10.3934\/amc.2020098-21","doi-asserted-by":"publisher","unstructured":"E. Fujisaki and T. Okamoto, Secure integration of asymmetric and symmetric encryption schemes, In <i>CRYPTO<\/i>, Lecture Notes in Comput. Sci., volume 1666, Springer, 1999,537\u2013554.","DOI":"10.1007\/3-540-48405-1_34"},{"key":"key-10.3934\/amc.2020098-22","doi-asserted-by":"publisher","unstructured":"S. Garg, C. Gentry, S. Halevi, A. Sahai and B. Waters, Attribute-based encryption for circuits from multilinear maps, In <i>CRYPTO<\/i>, Lecture Notes in Comput. Sci., volume 8043, Springer, 2013,479\u2013499.","DOI":"10.1007\/978-3-642-40084-1_27"},{"key":"key-10.3934\/amc.2020098-23","doi-asserted-by":"publisher","unstructured":"C. Gentry and A. Silverberg, Hierarchical ID-based cryptography, In <i>ASIACRYPT<\/i>, Lecture Notes in Comput. Sci., volume 2501, Springer, 2002,548\u2013566.","DOI":"10.1007\/3-540-36178-2_34"},{"key":"key-10.3934\/amc.2020098-24","doi-asserted-by":"publisher","unstructured":"S. Gorbunov, V. Vaikuntanathan and H. Wee., Attribute-based encryption for circuits, In <i>STOC'13\u2013Proceedings of the 2013 ACM Symposium on Theory of Computing<\/i>, ACM, 2013,545\u2013554.","DOI":"10.1145\/2488608.2488677"},{"key":"key-10.3934\/amc.2020098-25","doi-asserted-by":"publisher","unstructured":"V. Goyal, A. Jain, O. Pandey and A. Sahai, Bounded ciphertext policy attribute based encryption, In <i>Automata, Languages and Programming. Part II<\/i>, Lecture Notes in Comput. Sci., volume 5126, Springer, 2008,579\u2013591.","DOI":"10.1007\/978-3-540-70583-3_47"},{"key":"key-10.3934\/amc.2020098-26","doi-asserted-by":"publisher","unstructured":"V. Goyal, O. Pandey, A. Sahai and B. Waters, Attribute-based encryption for fine-grained access control of encrypted data, In <i>ACM Conference on Computer and Communications Security<\/i>, ACM, 2006, 89\u201398.","DOI":"10.1145\/1180405.1180418"},{"key":"key-10.3934\/amc.2020098-27","unstructured":"M. Hamburg, Spatial encryption, Cryptology ePrint Archive, Report 2011\/389, 2011, <a href=\"http:\/\/eprint.iacr.org\/\" target=\"_blank\">http:\/\/eprint.iacr.org\/<\/a>."},{"key":"key-10.3934\/amc.2020098-28","doi-asserted-by":"publisher","unstructured":"J. Katz, A. Sahai and B. Waters, Predicate encryption supporting disjunctions, polynomial equations, and inner products, In <i>EUROCRYPT<\/i>, Lecture Notes in Comput. Sci., volume 4965, Springer, 2008,146\u2013162.","DOI":"10.1007\/978-3-540-78967-3_9"},{"key":"key-10.3934\/amc.2020098-29","doi-asserted-by":"publisher","unstructured":"A. Lewko and B. Waters, New techniques for dual system encryption and fully secure HIBE with short ciphertexts, In <i>TCC<\/i>, of Lecture Notes in Comput. Sci., volume 5978, Springer, 2010,455\u2013479.","DOI":"10.1007\/978-3-642-11799-2_27"},{"key":"key-10.3934\/amc.2020098-30","doi-asserted-by":"publisher","unstructured":"A. Lewko and B. Waters, Decentralizing attribute-based encryption, In <i>EUROCRYPT<\/i>, Lecture Notes in Comput. Sci., volume 6632, Springer, 2011,568\u2013588.","DOI":"10.1007\/978-3-642-20465-4_31"},{"key":"key-10.3934\/amc.2020098-31","doi-asserted-by":"publisher","unstructured":"A. Lewko, T. Okamoto, A. Sahai, K. Takashima and B. Waters, Fully secure functional encryption: Attribute-based encryption and (hierarchical) inner product encryption, In <i>EUROCRYPT<\/i>, Lecture Notes in Comput. Sci., volume 6110, Springer, 2010, 62\u201391.","DOI":"10.1007\/978-3-642-13190-5_4"},{"key":"key-10.3934\/amc.2020098-32","doi-asserted-by":"publisher","unstructured":"D. Moriyama, H. Doi.A fully secure spatial encryption scheme, <i>IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences<\/i>, <b>94<\/b> (2011), 28-35.","DOI":"10.1587\/transfun.E94.A.28"},{"key":"key-10.3934\/amc.2020098-33","unstructured":"M. Nandi and T. Pandit, Generic conversions from CPA to CCA secure functional encryption, Cryptology ePrint Archive, Report 2015\/457, 2015, <a href=\"http:\/\/eprint.iacr.org\/\" target=\"_blank\">http:\/\/eprint.iacr.org\/<\/a>."},{"key":"key-10.3934\/amc.2020098-34","doi-asserted-by":"publisher","unstructured":"M. Nandi, T. Pandit.Verifiability-based conversion from CPA to CCA-secure predicate encryption, <i>Appl. Algebra Engrg. Comm. Comput.<\/i>, <b>29<\/b> (2018), 77-102.","DOI":"10.1007\/s00200-017-0330-2"},{"key":"key-10.3934\/amc.2020098-35","doi-asserted-by":"publisher","unstructured":"M. Nandi, T. Pandit.Delegation-based conversion from CPA to CCA-secure predicate encryption, <i>International Journal of Applied Cryptography<\/i>, <b>4<\/b> (2020), 16-35.","DOI":"10.1504\/ijact.2020.107163"},{"key":"key-10.3934\/amc.2020098-36","doi-asserted-by":"publisher","unstructured":"T. Okamoto and K. Takashima, Hierarchical predicate encryption for inner-products, In <i>ASIACRYPT<\/i>, Lecture Notes in Comput. Sci., volume 5912, Springer, 2009,214\u2013231.","DOI":"10.1007\/978-3-642-10366-7_13"},{"key":"key-10.3934\/amc.2020098-37","doi-asserted-by":"publisher","unstructured":"T. Okamoto and K. Takashima, Fully secure functional encryption with general relations from the decisional linear assumption, In <i>CRYPTO<\/i>, Lecture Notes in Comput. Sci., volume 6223, Springer, 2010,191\u2013208.","DOI":"10.1007\/978-3-642-14623-7_11"},{"key":"key-10.3934\/amc.2020098-38","doi-asserted-by":"publisher","unstructured":"T. Okamoto and K. Takashima, Achieving short ciphertexts or short secret-keys for adaptively secure general inner-product encryption, In <i>Cryptology and Network Security<\/i>, Lecture Notes in Comput. Sci., volume 7092, Springer, 2011,138\u2013159.","DOI":"10.1007\/978-3-642-25513-7_11"},{"key":"key-10.3934\/amc.2020098-39","doi-asserted-by":"publisher","unstructured":"T. Okamoto and K. Takashima, Adaptively attribute-hiding (hierarchical) inner product encryption, In <i>EUROCRYPT<\/i>, Lecture Notes in Comput. Sci., volume 7237, Springer, 2012,591\u2013608.","DOI":"10.1007\/978-3-642-29011-4_35"},{"key":"key-10.3934\/amc.2020098-40","doi-asserted-by":"publisher","unstructured":"T. Okamoto and K. Takashima, Fully secure unbounded inner-product and attribute-based encryption, In <i>ASIACRYPT<\/i>, Lecture Notes in Comput. Sci., volume 7658, Springer, 2012,349\u2013366.","DOI":"10.1007\/978-3-642-34961-4_22"},{"key":"key-10.3934\/amc.2020098-41","doi-asserted-by":"publisher","unstructured":"R. Rivest, A. Shamir, L. Adleman.A method for obtaining digital signatures and public-key cryptosystems, <i>Comm. ACM<\/i>, <b>21<\/b> (1978), 120-126.","DOI":"10.1145\/359340.359342"},{"key":"key-10.3934\/amc.2020098-42","doi-asserted-by":"publisher","unstructured":"A. Sahai and B. Waters, Fuzzy identity-based encryption, In <i>EUROCRYPT<\/i>, Lecture Notes in Comput. Sci., volume 3494, Springer, 2005,457\u2013473.","DOI":"10.1007\/11426639_27"},{"key":"key-10.3934\/amc.2020098-43","doi-asserted-by":"publisher","unstructured":"A. Shamir, Identity-based cryptosystems and signature schemes, In <i>CRYPTO<\/i>, Lecture Notes in Comput. Sci., volume 196, Springer, 1984, 47\u201353.","DOI":"10.1007\/3-540-39568-7_5"},{"key":"key-10.3934\/amc.2020098-44","doi-asserted-by":"publisher","unstructured":"B. Waters, Ciphertext-policy attribute-based encryption: An expressive, efficient, and provably secure realization, In <i>PKC<\/i>, Lecture Notes in Comput. Sci., volume 6571, Springer, 2011, 53\u201370.","DOI":"10.1007\/978-3-642-19379-8_4"},{"key":"key-10.3934\/amc.2020098-45","doi-asserted-by":"publisher","unstructured":"B. Waters, Dual system encryption: Realizing fully secure IBE and HIBE under simple assumptions, In <i>CRYPTO<\/i>, Lecture Notes in Comput. Sci., volume 5677, Springer, 2009,619\u2013636.","DOI":"10.1007\/978-3-642-03356-8_36"},{"key":"key-10.3934\/amc.2020098-46","doi-asserted-by":"publisher","unstructured":"B. Waters, Ciphertext-policy attribute-based encryption: An expressive, efficient, and provably secure realization, In <i>PKC<\/i>, Lecture Notes in Comput. Sci., volume 6571, Springer, 2011, 53\u201370.","DOI":"10.1007\/978-3-642-19379-8_4"},{"key":"key-10.3934\/amc.2020098-47","doi-asserted-by":"publisher","unstructured":"B. Waters, Functional encryption for regular languages, In <i>CRYPTO<\/i>, Lecture Notes in Comput. Sci., volume 7417, Springer, 2012,218\u2013235.","DOI":"10.1007\/978-3-642-32009-5_14"},{"key":"key-10.3934\/amc.2020098-48","doi-asserted-by":"publisher","unstructured":"H. Wee, Dual system encryption via predicate encodings, In <i>TCC<\/i>, Lecture Notes in Comput. Sci., volume 8349, Springer, 2014,616\u2013637.","DOI":"10.1007\/978-3-642-54242-8_26"},{"key":"key-10.3934\/amc.2020098-49","doi-asserted-by":"publisher","unstructured":"S. Yamada, N. Attrapadung, G. Hanaoka and N. Kunihiro, Generic constructions for chosen-ciphertext secure attribute based encryption, In <i>PKC<\/i>, Lecture Notes in Comput. Sci., volume 6571, Springer, 2011, 71\u201389.","DOI":"10.1007\/978-3-642-19379-8_5"},{"key":"key-10.3934\/amc.2020098-50","doi-asserted-by":"publisher","unstructured":"S. Yamada, N. Attrapadung, B. Santoso, J. C. N. Schuldt, Goichiro Hanaoka and Noboru Kunihiro, Verifiable predicate encryption and applications to CCA security and anonymous predicate authentication, In <i>PKC<\/i>, Lecture Notes in Comput. Sci., volume 7293, Springer, 2012,243\u2013261.","DOI":"10.1007\/978-3-642-30057-8_15"},{"key":"key-10.3934\/amc.2020098-51","doi-asserted-by":"publisher","unstructured":"M. Zhou and Z. Cao, Spatial encryption under simpler assumption, In <i>PROVSEC<\/i>, Lecture Notes in Comput. Sci., volume 5848, Springer, 2009, 19\u201331.","DOI":"10.1007\/978-3-642-04642-1_4"}],"container-title":["Advances in Mathematics of Communications"],"original-title":[],"link":[{"URL":"https:\/\/www.aimsciences.org\/article\/exportPdf?id=cd5ba434-d40f-4540-b194-8e0d89176196","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,12,30]],"date-time":"2021-12-30T11:44:20Z","timestamp":1640864660000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.aimsciences.org\/article\/doi\/10.3934\/amc.2020098"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"references-count":51,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2022]]}},"alternative-id":["1930-5346_2022_1_37"],"URL":"https:\/\/doi.org\/10.3934\/amc.2020098","relation":{},"ISSN":["1930-5346","1930-5338"],"issn-type":[{"value":"1930-5346","type":"print"},{"value":"1930-5338","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022]]}}}