CCA2 attack and modification of huang et al.'s public key encryption with authorized equality test
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Lee, H.T. | - |
dc.contributor.author | Ling, S. | - |
dc.contributor.author | Seo, J.H. | - |
dc.contributor.author | Wang, H. | - |
dc.date.accessioned | 2023-03-08T16:47:20Z | - |
dc.date.available | 2023-03-08T16:47:20Z | - |
dc.date.issued | 2016-11 | - |
dc.identifier.issn | 0010-4620 | - |
dc.identifier.issn | 1460-2067 | - |
dc.identifier.uri | https://scholarworks.bwise.kr/cau/handle/2019.sw.cau/64110 | - |
dc.description.abstract | In this article, we identify a flaw in Huang et al.'s public key encryption with authorized equality test (The Computer Journal, 2015). More precisely, we point out that the proof of the indistinguishability under adaptive chosen ciphertext attack (IND-CCA2) security for their scheme has a serious flaw. We illustrate this flaw by presenting a polynomial time CCA2 attack on their scheme. We also provide a solution to correct this flaw by modifying their scheme slightly. Our solution is quite efficient because it provides security against CCA2 attack by exploiting only the hash computation of a two times longer input without any increase in the sizes of ciphertexts and warrants. | - |
dc.format.extent | 6 | - |
dc.language | 영어 | - |
dc.language.iso | ENG | - |
dc.publisher | Oxford University Press | - |
dc.title | CCA2 attack and modification of huang et al.'s public key encryption with authorized equality test | - |
dc.type | Article | - |
dc.identifier.doi | 10.1093/comjnl/bxw033 | - |
dc.identifier.bibliographicCitation | Computer Journal, v.59, no.11, pp 1689 - 1694 | - |
dc.description.isOpenAccess | Y | - |
dc.identifier.wosid | 000397052700008 | - |
dc.identifier.scopusid | 2-s2.0-85016061736 | - |
dc.citation.endPage | 1694 | - |
dc.citation.number | 11 | - |
dc.citation.startPage | 1689 | - |
dc.citation.title | Computer Journal | - |
dc.citation.volume | 59 | - |
dc.type.docType | Article | - |
dc.publisher.location | 영국 | - |
dc.subject.keywordAuthor | Adaptive chosen ciphertext attack | - |
dc.subject.keywordAuthor | Authorized equality test | - |
dc.subject.keywordAuthor | Public key encryption | - |
dc.relation.journalResearchArea | Computer Science | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Hardware & Architecture | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Information Systems | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Software Engineering | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Theory & Methods | - |
dc.description.journalRegisteredClass | scie | - |
dc.description.journalRegisteredClass | scopus | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
84, Heukseok-ro, Dongjak-gu, Seoul, Republic of Korea (06974)02-820-6194
COPYRIGHT 2019 Chung-Ang University All Rights Reserved.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.