A Predicate Encryption Scheme Supporting Multiparty Cloud Computation

Multiparty cloud computation can deal with the problem that the traditional homomorphic encryption can't operation on the ciphertexts generated by different users, and the final result is computed by cloud server. The trivial multiparty cloud computation doesn't take the access control to the final result into consideration. In reality, we perhaps do not want all parties to gain the result. In this paper we construct a predicate encryption with multiplicative homomorphic property for the class of inner-product predicates. The scheme can also support multiparty cloud computation. By use of predicate encryption, we can realize the fine-grained access control. At last, we prove that our scheme is secure under IND-AH-CPA.

[1]  Ronald L. Rivest,et al.  ON DATA BANKS AND PRIVACY HOMOMORPHISMS , 1978 .

[2]  Silvio Micali,et al.  Probabilistic encryption & how to play mental poker keeping secret all partial information , 1982, STOC '82.

[3]  Adi Shamir,et al.  Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.

[4]  Taher ElGamal,et al.  A public key cyryptosystem and signature scheme based on discrete logarithms , 1985 .

[5]  Pascal Paillier,et al.  Public-Key Cryptosystems Based on Composite Degree Residuosity Classes , 1999, EUROCRYPT.

[6]  Brent Waters,et al.  Fuzzy Identity-Based Encryption , 2005, EUROCRYPT.

[7]  Dan Boneh,et al.  Evaluating 2-DNF Formulas on Ciphertexts , 2005, TCC.

[8]  Brent Waters,et al.  Efficient Identity-Based Encryption Without Random Oracles , 2005, EUROCRYPT.

[9]  Brent Waters,et al.  Attribute-based encryption for fine-grained access control of encrypted data , 2006, CCS '06.

[10]  Brent Waters,et al.  Conjunctive, Subset, and Range Queries on Encrypted Data , 2007, TCC.

[11]  A. Lewko,et al.  Fully Secure HIBE with Short Ciphertexts , 2009 .

[12]  Allison Bishop,et al.  Fully Secure Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner Product Encryption , 2010, EUROCRYPT.

[13]  Jonathan Katz,et al.  Predicate Encryption Supporting Disjunctions, Polynomial Equations, and Inner Products , 2008, Journal of Cryptology.

[14]  Xinwen Zhang,et al.  Multiparty Cloud Computation , 2012, ArXiv.

[15]  Hitesh Tewari,et al.  Homomorphic Encryption with Access Policies: Characterization and New Constructions , 2013, AFRICACRYPT.