Semi-generic construction of public key encryption and identity-based encryption with equality test
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Lee, H.T. | - |
dc.contributor.author | Ling, S. | - |
dc.contributor.author | Seo, J.H. | - |
dc.contributor.author | Wang, H. | - |
dc.date.accessioned | 2023-03-08T16:12:47Z | - |
dc.date.available | 2023-03-08T16:12:47Z | - |
dc.date.issued | 2016-12 | - |
dc.identifier.issn | 0020-0255 | - |
dc.identifier.issn | 1872-6291 | - |
dc.identifier.uri | https://scholarworks.bwise.kr/cau/handle/2019.sw.cau/64076 | - |
dc.description.abstract | Public key encryption with equality test (PKEET), which was first introduced by Yang et al. (CT-RSA, 2010), has various applications including facilitating keyword search on encrypted data and partitioning encrypted data on the cloud. It can be also applied to manage personal health records on the internet. For these reasons, there have been improvements on earlier PKEET schemes in terms of performance and functionality. We present a semi-generic method for PKEET constructions, assuming only the existence of IND-CCA2 secure traditional public key encryption (PKE) schemes, the hardness of Computational Diffie-Hellman (CDH) problems, and random oracles. Our approach has several advantages; it enables us to understand requirements for the equality test functionality more clearly. Furthermore, our approach is quite general, in that if we change the underlying PKE scheme with the identity-based encryption (IBE) scheme (and we assume the hardness of Bilinear Diffie-Hellman problems instead of CDH), then we obtain the first IBE scheme with equality test (IBEET) satisfying analogous security arguments to those of PKEET. Although an IBEET construction was recently proposed, but we note that it satisfies only weak security requirements. | - |
dc.format.extent | 22 | - |
dc.language | 영어 | - |
dc.language.iso | ENG | - |
dc.publisher | Elsevier Inc. | - |
dc.title | Semi-generic construction of public key encryption and identity-based encryption with equality test | - |
dc.type | Article | - |
dc.identifier.doi | 10.1016/j.ins.2016.09.013 | - |
dc.identifier.bibliographicCitation | Information Sciences, v.373, pp 419 - 440 | - |
dc.description.isOpenAccess | Y | - |
dc.identifier.wosid | 000385470400025 | - |
dc.identifier.scopusid | 2-s2.0-84987973291 | - |
dc.citation.endPage | 440 | - |
dc.citation.startPage | 419 | - |
dc.citation.title | Information Sciences | - |
dc.citation.volume | 373 | - |
dc.type.docType | Article | - |
dc.publisher.location | 미국 | - |
dc.subject.keywordAuthor | Equality test | - |
dc.subject.keywordAuthor | Identity-based encryption | - |
dc.subject.keywordAuthor | Public key encryption | - |
dc.subject.keywordAuthor | Random oracle model | - |
dc.relation.journalResearchArea | Computer Science | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Information Systems | - |
dc.description.journalRegisteredClass | sci | - |
dc.description.journalRegisteredClass | scie | - |
dc.description.journalRegisteredClass | scopus | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
84, Heukseok-ro, Dongjak-gu, Seoul, Republic of Korea (06974)02-820-6194
COPYRIGHT 2019 Chung-Ang University All Rights Reserved.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.