完整後設資料紀錄
DC 欄位語言
dc.contributor.authorTseng, Fu-Kuoen_US
dc.contributor.authorChen, Rong-Jayeen_US
dc.date.accessioned2015-12-02T02:59:41Z-
dc.date.available2015-12-02T02:59:41Z-
dc.date.issued2015-09-01en_US
dc.identifier.issn1745-1337en_US
dc.identifier.urihttp://dx.doi.org/10.1587/transfun.E98.A.1982en_US
dc.identifier.urihttp://hdl.handle.net/11536/128438-
dc.description.abstractA predicate encryption scheme enables the owner of the master key to enforce fine-grained access control on encrypted cloud data through the delegation of predicate tokens to cloud storages. In particular, Blundo et al. proposed a construction where a predicate token reveals partial information of the involved keywords to enable efficient operations on encrypted keywords. However, we found that a predicate token reveals more information than what was claimed because of the encoding scheme. In this letter, we not only analyze this extra information leakage but also present an improved encoding scheme for the Blundo et al\'s scheme and the other similar schemes to preserve predicate privacy.en_US
dc.language.isoen_USen_US
dc.subjectsymmetric predicate encryption schemeen_US
dc.subjecthidden vector encryption schemeen_US
dc.subjectpredicate privacyen_US
dc.subjectvector encodingen_US
dc.subjectcloud storageen_US
dc.titleCryptanalysis and Improvement of an Encoding Method for Private-Key Hidden Vector Encryptionsen_US
dc.typeArticleen_US
dc.identifier.doi10.1587/transfun.E98.A.1982en_US
dc.identifier.journalIEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCESen_US
dc.citation.volumeE98Aen_US
dc.citation.spage1982en_US
dc.citation.epage1984en_US
dc.contributor.department資訊工程學系zh_TW
dc.contributor.departmentDepartment of Computer Scienceen_US
dc.identifier.wosnumberWOS:000364414000015en_US
dc.citation.woscount0en_US
顯示於類別:期刊論文