Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

Public key encryption with equality test in the standard model

Full metadata record
DC Field Value Language
dc.contributor.authorLee, H.T.-
dc.contributor.authorLing, S.-
dc.contributor.authorSeo, J.H.-
dc.contributor.authorWang, H.-
dc.contributor.authorYoun, T.-Y.-
dc.date.accessioned2023-03-08T14:05:05Z-
dc.date.available2023-03-08T14:05:05Z-
dc.date.issued2020-04-
dc.identifier.issn0020-0255-
dc.identifier.issn1872-6291-
dc.identifier.urihttps://scholarworks.bwise.kr/cau/handle/2019.sw.cau/63422-
dc.description.abstractPublic key encryption with equality test (PKEET) is a cryptosystem that allows a tester who has trapdoors issued by one or more users Ui to perform equality tests on ciphertexts encrypted using public key(s) of Ui. Since this feature has a lot of practical applications including search on encrypted data, several PKEET schemes have been proposed so far. However, to the best of our knowledge, all the existing proposals are proven secure only under the hardness of number-theoretic problems and/or the random oracle heuristics. In this paper, we show that this primitive can be achieved not only generically from well-established other primitives but also even without relying on the random oracle heuristics. More precisely, our generic construction for PKEET employs a two-level hierarchical identity-based encryption scheme, which is selectively secure against chosen plaintext attacks, a strongly unforgeable one-time signature scheme and a cryptographic hash function. Our generic approach toward PKEET has several advantages over all the previous works; it directly leads the first standard model construction and also directly implies the first lattice-based construction. Finally, we show how to extend our approach to the identity-based setting.-
dc.format.extent20-
dc.language영어-
dc.language.isoENG-
dc.publisherElsevier Inc.-
dc.titlePublic key encryption with equality test in the standard model-
dc.typeArticle-
dc.identifier.doi10.1016/j.ins.2019.12.023-
dc.identifier.bibliographicCitationInformation Sciences, v.516, pp 89 - 108-
dc.description.isOpenAccessN-
dc.identifier.wosid000515432200006-
dc.identifier.scopusid2-s2.0-85077069086-
dc.citation.endPage108-
dc.citation.startPage89-
dc.citation.titleInformation Sciences-
dc.citation.volume516-
dc.type.docTypeArticle-
dc.publisher.location미국-
dc.subject.keywordAuthorIdentity-based encryption with equality test-
dc.subject.keywordAuthorPublic key encryption with equality test-
dc.subject.keywordAuthorStandard model-
dc.subject.keywordPlusIDENTITY-BASED ENCRYPTION-
dc.subject.keywordPlusSTRONGLY UNFORGEABLE SIGNATURES-
dc.subject.keywordPlusGENERIC CONSTRUCTION-
dc.relation.journalResearchAreaComputer Science-
dc.relation.journalWebOfScienceCategoryComputer Science, Information Systems-
dc.description.journalRegisteredClassscie-
dc.description.journalRegisteredClassscopus-
Files in This Item
There are no files associated with this item.
Appears in
Collections
College of Software > School of Computer Science and Engineering > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher Lee, Hyungtae photo

Lee, Hyungtae
소프트웨어대학 (소프트웨어학부)
Read more

Altmetrics

Total Views & Downloads

BROWSE