Delegating Capabilities in Predicate Encryption Systems View Full Text


Ontology type: schema:Chapter      Open Access: True


Chapter Info

DATE

2008-01-01

AUTHORS

Elaine Shi , Brent Waters

ABSTRACT

In predicate encryption systems, given a capability, one can evaluate one or more predicates on the plaintext encrypted, while all other information about the plaintext remains hidden. We consider the role of delegation in such predicate encryption systems. Suppose Alice has a capability, and she wishes to delegate to Bob a more restrictive capability allowing the decryption of a subset of the information Alice can learn about the plaintext encrypted. We formally define delegation in predicate encryption systems, propose a new security definition for delegation, and give an efficient construction supporting conjunctive queries. The security of our construction can be reduced to the general 3-party Bilinear Diffie-Hellman assumption, and the Bilinear Decisional Diffie-Hellman assumption in composite order bilinear groups. More... »

PAGES

560-578

Book

TITLE

Automata, Languages and Programming

ISBN

978-3-540-70582-6
978-3-540-70583-3

Identifiers

URI

http://scigraph.springernature.com/pub.10.1007/978-3-540-70583-3_46

DOI

http://dx.doi.org/10.1007/978-3-540-70583-3_46

DIMENSIONS

https://app.dimensions.ai/details/publication/pub.1032002783


Indexing Status Check whether this publication has been indexed by Scopus and Web Of Science using the SN Indexing Status Tool
Incoming Citations Browse incoming citations for this publication using opencitations.net

JSON-LD is the canonical representation for SciGraph data.

TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

[
  {
    "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
    "about": [
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/08", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Information and Computing Sciences", 
        "type": "DefinedTerm"
      }, 
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0804", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Data Format", 
        "type": "DefinedTerm"
      }
    ], 
    "author": [
      {
        "affiliation": {
          "alternateName": "Carnegie Mellon University", 
          "id": "http://www.grid.ac/institutes/grid.147455.6", 
          "name": [
            "Carnegie Mellon University"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Shi", 
        "givenName": "Elaine", 
        "id": "sg:person.014706274717.52", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.014706274717.52"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "SRI International", 
          "id": "http://www.grid.ac/institutes/grid.98913.3a", 
          "name": [
            "SRI International"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Waters", 
        "givenName": "Brent", 
        "id": "sg:person.013232452417.29", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.013232452417.29"
        ], 
        "type": "Person"
      }
    ], 
    "datePublished": "2008-01-01", 
    "datePublishedReg": "2008-01-01", 
    "description": "In predicate encryption systems, given a capability, one can evaluate one or more predicates on the plaintext encrypted, while all other information about the plaintext remains hidden. We consider the role of delegation in such predicate encryption systems. Suppose Alice has a capability, and she wishes to delegate to Bob a more restrictive capability allowing the decryption of a subset of the information Alice can learn about the plaintext encrypted. We formally define delegation in predicate encryption systems, propose a new security definition for delegation, and give an efficient construction supporting conjunctive queries. The security of our construction can be reduced to the general 3-party Bilinear Diffie-Hellman assumption, and the Bilinear Decisional Diffie-Hellman assumption in composite order bilinear groups.", 
    "editor": [
      {
        "familyName": "Aceto", 
        "givenName": "Luca", 
        "type": "Person"
      }, 
      {
        "familyName": "Damg\u00e5rd", 
        "givenName": "Ivan", 
        "type": "Person"
      }, 
      {
        "familyName": "Goldberg", 
        "givenName": "Leslie Ann", 
        "type": "Person"
      }, 
      {
        "familyName": "Halld\u00f3rsson", 
        "givenName": "Magn\u00fas M.", 
        "type": "Person"
      }, 
      {
        "familyName": "Ing\u00f3lfsd\u00f3ttir", 
        "givenName": "Anna", 
        "type": "Person"
      }, 
      {
        "familyName": "Walukiewicz", 
        "givenName": "Igor", 
        "type": "Person"
      }
    ], 
    "genre": "chapter", 
    "id": "sg:pub.10.1007/978-3-540-70583-3_46", 
    "inLanguage": "en", 
    "isAccessibleForFree": true, 
    "isPartOf": {
      "isbn": [
        "978-3-540-70582-6", 
        "978-3-540-70583-3"
      ], 
      "name": "Automata, Languages and Programming", 
      "type": "Book"
    }, 
    "keywords": [
      "predicate encryption systems", 
      "Diffie-Hellman assumption", 
      "encryption system", 
      "Bilinear Diffie-Hellman assumption", 
      "Bilinear Decisional Diffie-Hellman assumption", 
      "decisional Diffie-Hellman assumption", 
      "composite order bilinear groups", 
      "new security definition", 
      "security definitions", 
      "conjunctive queries", 
      "bilinear groups", 
      "plaintext", 
      "role of delegation", 
      "efficient construction", 
      "capability", 
      "more predicates", 
      "restrictive capabilities", 
      "delegation", 
      "decryption", 
      "queries", 
      "system", 
      "security", 
      "Alice", 
      "predicates", 
      "information", 
      "Bob", 
      "construction", 
      "definition", 
      "assumption", 
      "subset", 
      "role", 
      "group", 
      "such predicate encryption systems", 
      "Suppose Alice", 
      "information Alice", 
      "order bilinear groups"
    ], 
    "name": "Delegating Capabilities in Predicate Encryption Systems", 
    "pagination": "560-578", 
    "productId": [
      {
        "name": "dimensions_id", 
        "type": "PropertyValue", 
        "value": [
          "pub.1032002783"
        ]
      }, 
      {
        "name": "doi", 
        "type": "PropertyValue", 
        "value": [
          "10.1007/978-3-540-70583-3_46"
        ]
      }
    ], 
    "publisher": {
      "name": "Springer Nature", 
      "type": "Organisation"
    }, 
    "sameAs": [
      "https://doi.org/10.1007/978-3-540-70583-3_46", 
      "https://app.dimensions.ai/details/publication/pub.1032002783"
    ], 
    "sdDataset": "chapters", 
    "sdDatePublished": "2021-12-01T20:09", 
    "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
    "sdPublisher": {
      "name": "Springer Nature - SN SciGraph project", 
      "type": "Organization"
    }, 
    "sdSource": "s3://com-springernature-scigraph/baseset/20211201/entities/gbq_results/chapter/chapter_410.jsonl", 
    "type": "Chapter", 
    "url": "https://doi.org/10.1007/978-3-540-70583-3_46"
  }
]
 

Download the RDF metadata as:  json-ld nt turtle xml License info

HOW TO GET THIS DATA PROGRAMMATICALLY:

JSON-LD is a popular format for linked data which is fully compatible with JSON.

curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/978-3-540-70583-3_46'

N-Triples is a line-based linked data format ideal for batch operations.

curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/978-3-540-70583-3_46'

Turtle is a human-readable linked data format.

curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/978-3-540-70583-3_46'

RDF/XML is a standard XML format for linked data.

curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/978-3-540-70583-3_46'


 

This table displays all metadata directly associated to this object as RDF triples.

131 TRIPLES      23 PREDICATES      61 URIs      54 LITERALS      7 BLANK NODES

Subject Predicate Object
1 sg:pub.10.1007/978-3-540-70583-3_46 schema:about anzsrc-for:08
2 anzsrc-for:0804
3 schema:author N089fc9cd162c4550be25cb715e865859
4 schema:datePublished 2008-01-01
5 schema:datePublishedReg 2008-01-01
6 schema:description In predicate encryption systems, given a capability, one can evaluate one or more predicates on the plaintext encrypted, while all other information about the plaintext remains hidden. We consider the role of delegation in such predicate encryption systems. Suppose Alice has a capability, and she wishes to delegate to Bob a more restrictive capability allowing the decryption of a subset of the information Alice can learn about the plaintext encrypted. We formally define delegation in predicate encryption systems, propose a new security definition for delegation, and give an efficient construction supporting conjunctive queries. The security of our construction can be reduced to the general 3-party Bilinear Diffie-Hellman assumption, and the Bilinear Decisional Diffie-Hellman assumption in composite order bilinear groups.
7 schema:editor N7b3c3bbea2dc41b8a5bbe568f2983e3e
8 schema:genre chapter
9 schema:inLanguage en
10 schema:isAccessibleForFree true
11 schema:isPartOf N408c7ff23ad04b45a872946b95c12fcb
12 schema:keywords Alice
13 Bilinear Decisional Diffie-Hellman assumption
14 Bilinear Diffie-Hellman assumption
15 Bob
16 Diffie-Hellman assumption
17 Suppose Alice
18 assumption
19 bilinear groups
20 capability
21 composite order bilinear groups
22 conjunctive queries
23 construction
24 decisional Diffie-Hellman assumption
25 decryption
26 definition
27 delegation
28 efficient construction
29 encryption system
30 group
31 information
32 information Alice
33 more predicates
34 new security definition
35 order bilinear groups
36 plaintext
37 predicate encryption systems
38 predicates
39 queries
40 restrictive capabilities
41 role
42 role of delegation
43 security
44 security definitions
45 subset
46 such predicate encryption systems
47 system
48 schema:name Delegating Capabilities in Predicate Encryption Systems
49 schema:pagination 560-578
50 schema:productId N0f4475e0a9234de48c0de1888b2bc884
51 N7a020cd8ca724726b22cdc54761e6944
52 schema:publisher N71a40761e6144a7598e5bd2996ad199c
53 schema:sameAs https://app.dimensions.ai/details/publication/pub.1032002783
54 https://doi.org/10.1007/978-3-540-70583-3_46
55 schema:sdDatePublished 2021-12-01T20:09
56 schema:sdLicense https://scigraph.springernature.com/explorer/license/
57 schema:sdPublisher N47dea01c1d7246fdb1aed62ee332101c
58 schema:url https://doi.org/10.1007/978-3-540-70583-3_46
59 sgo:license sg:explorer/license/
60 sgo:sdDataset chapters
61 rdf:type schema:Chapter
62 N05103ae8cfd24314814f73481ea6dfca rdf:first N45f0f9370a204c8182c262ea452d429b
63 rdf:rest rdf:nil
64 N089fc9cd162c4550be25cb715e865859 rdf:first sg:person.014706274717.52
65 rdf:rest N9de6ea316e7447e686a18975b2a00660
66 N0d4234cc7db843798da06f285be595a5 rdf:first Nf3d9ac7aab904361999bb8447d479008
67 rdf:rest N05103ae8cfd24314814f73481ea6dfca
68 N0f4475e0a9234de48c0de1888b2bc884 schema:name dimensions_id
69 schema:value pub.1032002783
70 rdf:type schema:PropertyValue
71 N11052f9af90c49ffb5d786ccf7f20e4d schema:familyName Damgård
72 schema:givenName Ivan
73 rdf:type schema:Person
74 N34bcd513093b46b0a0bfd9084cedc69a rdf:first N39665139a87c4c0991c537656bf62f76
75 rdf:rest N0d4234cc7db843798da06f285be595a5
76 N39665139a87c4c0991c537656bf62f76 schema:familyName Halldórsson
77 schema:givenName Magnús M.
78 rdf:type schema:Person
79 N408c7ff23ad04b45a872946b95c12fcb schema:isbn 978-3-540-70582-6
80 978-3-540-70583-3
81 schema:name Automata, Languages and Programming
82 rdf:type schema:Book
83 N45f0f9370a204c8182c262ea452d429b schema:familyName Walukiewicz
84 schema:givenName Igor
85 rdf:type schema:Person
86 N47dea01c1d7246fdb1aed62ee332101c schema:name Springer Nature - SN SciGraph project
87 rdf:type schema:Organization
88 N6789884e02114b94a9bb53f6b164cd69 schema:familyName Goldberg
89 schema:givenName Leslie Ann
90 rdf:type schema:Person
91 N71a40761e6144a7598e5bd2996ad199c schema:name Springer Nature
92 rdf:type schema:Organisation
93 N7a020cd8ca724726b22cdc54761e6944 schema:name doi
94 schema:value 10.1007/978-3-540-70583-3_46
95 rdf:type schema:PropertyValue
96 N7b3c3bbea2dc41b8a5bbe568f2983e3e rdf:first N83a21480cee94ceca8cad887976d2cef
97 rdf:rest Ncdc5ec1b727743e3b50e9ad6b51acde3
98 N83a21480cee94ceca8cad887976d2cef schema:familyName Aceto
99 schema:givenName Luca
100 rdf:type schema:Person
101 N9de6ea316e7447e686a18975b2a00660 rdf:first sg:person.013232452417.29
102 rdf:rest rdf:nil
103 Ncdc5ec1b727743e3b50e9ad6b51acde3 rdf:first N11052f9af90c49ffb5d786ccf7f20e4d
104 rdf:rest Nd0194573884a4f09902936029fc604aa
105 Nd0194573884a4f09902936029fc604aa rdf:first N6789884e02114b94a9bb53f6b164cd69
106 rdf:rest N34bcd513093b46b0a0bfd9084cedc69a
107 Nf3d9ac7aab904361999bb8447d479008 schema:familyName Ingólfsdóttir
108 schema:givenName Anna
109 rdf:type schema:Person
110 anzsrc-for:08 schema:inDefinedTermSet anzsrc-for:
111 schema:name Information and Computing Sciences
112 rdf:type schema:DefinedTerm
113 anzsrc-for:0804 schema:inDefinedTermSet anzsrc-for:
114 schema:name Data Format
115 rdf:type schema:DefinedTerm
116 sg:person.013232452417.29 schema:affiliation grid-institutes:grid.98913.3a
117 schema:familyName Waters
118 schema:givenName Brent
119 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.013232452417.29
120 rdf:type schema:Person
121 sg:person.014706274717.52 schema:affiliation grid-institutes:grid.147455.6
122 schema:familyName Shi
123 schema:givenName Elaine
124 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.014706274717.52
125 rdf:type schema:Person
126 grid-institutes:grid.147455.6 schema:alternateName Carnegie Mellon University
127 schema:name Carnegie Mellon University
128 rdf:type schema:Organization
129 grid-institutes:grid.98913.3a schema:alternateName SRI International
130 schema:name SRI International
131 rdf:type schema:Organization
 




Preview window. Press ESC to close (or click here)


...