Membership encryption and its applications

Fuchun Guo, Yi Mu, Willy Susilo, Vijay Varadharajan

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contribution

12 Citations (Scopus)


We propose a new encryption primitive called Membership Encryption. Let P(G) be a privacy-preserving token on a group attribute/identity G, such that given P(G) it is hard to know the attributes in G. In this membership encryption, if an encryption takes as input an attribute A and the token P(G), the decryption requires holding the membership A ∈ G, i.e., A belongs to this group attribute. Membership encryption is applicable in constructing membership proof A ∈ P(G) with privacy preserving on group attribute and the membership. Membership encryption can be also utilized to construct an efficient two-round K-out-of-N oblivious transfer protocol. In this paper, we construct a provably secure membership encryption where the group token P(G) is constant-size with maximum number accountability on attributes. Using our scheme, the proposed oblivious transfer protocol exhibits the nice feature of O(1) communication cost for any K from receiver to sender, and O(N) communication cost from sender to receiver.

Original languageEnglish
Title of host publicationInformation Security and Privacy - 18th Australasian Conference, ACISP 2013, Proceedings
EditorsColin Boyd, Leonie Simpson
Place of PublicationHeidelberg
PublisherSpringer, Springer Nature
Number of pages16
ISBN (Print)9783642390586
Publication statusPublished - 2013
Event18th Australasian Conference on Information Security and Privacy, ACISP 2013 - Brisbane, QLD, Australia
Duration: 1 Jul 20133 Jul 2013

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume7959 LNCS
ISSN (Print)03029743
ISSN (Electronic)16113349


Other18th Australasian Conference on Information Security and Privacy, ACISP 2013
CityBrisbane, QLD

Fingerprint Dive into the research topics of 'Membership encryption and its applications'. Together they form a unique fingerprint.

Cite this