Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

CCA2 attack and modification of huang et al.'s public key encryption with authorized equality testopen access

Authors
Lee, H.T.Ling, S.Seo, J.H.Wang, H.
Issue Date
Nov-2016
Publisher
Oxford University Press
Keywords
Adaptive chosen ciphertext attack; Authorized equality test; Public key encryption
Citation
Computer Journal, v.59, no.11, pp 1689 - 1694
Pages
6
Journal Title
Computer Journal
Volume
59
Number
11
Start Page
1689
End Page
1694
URI
https://scholarworks.bwise.kr/cau/handle/2019.sw.cau/64110
DOI
10.1093/comjnl/bxw033
ISSN
0010-4620
1460-2067
Abstract
In this article, we identify a flaw in Huang et al.'s public key encryption with authorized equality test (The Computer Journal, 2015). More precisely, we point out that the proof of the indistinguishability under adaptive chosen ciphertext attack (IND-CCA2) security for their scheme has a serious flaw. We illustrate this flaw by presenting a polynomial time CCA2 attack on their scheme. We also provide a solution to correct this flaw by modifying their scheme slightly. Our solution is quite efficient because it provides security against CCA2 attack by exploiting only the hash computation of a two times longer input without any increase in the sizes of ciphertexts and warrants.
Files in This Item
Appears in
Collections
College of Software > School of Computer Science and Engineering > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher Lee, Hyungtae photo

Lee, Hyungtae
소프트웨어대학 (소프트웨어학부)
Read more

Altmetrics

Total Views & Downloads

BROWSE