Public key encryption with equality test in the standard model
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Lee, Hyung Tae | - |
dc.contributor.author | Ling, San | - |
dc.contributor.author | Seo, Jae Hong | - |
dc.contributor.author | Wang, Huaxiong | - |
dc.contributor.author | Youn, Taek-Young | - |
dc.date.accessioned | 2022-07-08T06:10:06Z | - |
dc.date.available | 2022-07-08T06:10:06Z | - |
dc.date.created | 2021-05-12 | - |
dc.date.issued | 2020-04 | - |
dc.identifier.issn | 0020-0255 | - |
dc.identifier.uri | https://scholarworks.bwise.kr/hanyang/handle/2021.sw.hanyang/145883 | - |
dc.description.abstract | Public key encryption with equality test (PKEET) is a cryptosystem that allows a tester who has trapdoors issued by one or more users U-i to perform equality tests on ciphertexts encrypted using public key(s) of U-i. Since this feature has a lot of practical applications including search on encrypted data, several PKEET schemes have been proposed so far. However, to the best of our knowledge, all the existing proposals are proven secure only under the hardness of number-theoretic problems and/or the random oracle heuristics. In this paper, we show that this primitive can be achieved not only generically from well-established other primitives but also even without relying on the random oracle heuristics. More precisely, our generic construction for PKEET employs a two-level hierarchical identity-based encryption scheme, which is selectively secure against chosen plaintext at-tacks, a strongly unforgeable one-time signature scheme and a cryptographic hash function. Our generic approach toward PKEET has several advantages over all the previous works; it directly leads the first standard model construction and also directly implies the first lattice-based construction. Finally, we show how to extend our approach to the identity-based setting. | - |
dc.language | 영어 | - |
dc.language.iso | en | - |
dc.publisher | ELSEVIER SCIENCE INC | - |
dc.title | Public key encryption with equality test in the standard model | - |
dc.type | Article | - |
dc.contributor.affiliatedAuthor | Seo, Jae Hong | - |
dc.identifier.doi | 10.1016/j.ins.2019.12.023 | - |
dc.identifier.scopusid | 2-s2.0-85077069086 | - |
dc.identifier.wosid | 000515432200006 | - |
dc.identifier.bibliographicCitation | INFORMATION SCIENCES, v.516, pp.89 - 108 | - |
dc.relation.isPartOf | INFORMATION SCIENCES | - |
dc.citation.title | INFORMATION SCIENCES | - |
dc.citation.volume | 516 | - |
dc.citation.startPage | 89 | - |
dc.citation.endPage | 108 | - |
dc.type.rims | ART | - |
dc.type.docType | Article | - |
dc.description.journalClass | 1 | - |
dc.description.isOpenAccess | N | - |
dc.description.journalRegisteredClass | scie | - |
dc.description.journalRegisteredClass | scopus | - |
dc.relation.journalResearchArea | Computer Science | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Information Systems | - |
dc.subject.keywordPlus | IDENTITY-BASED ENCRYPTION | - |
dc.subject.keywordPlus | STRONGLY UNFORGEABLE SIGNATURES | - |
dc.subject.keywordPlus | GENERIC CONSTRUCTION | - |
dc.subject.keywordAuthor | Public key encryption with equality test | - |
dc.subject.keywordAuthor | Identity-based encryption with equality test | - |
dc.subject.keywordAuthor | Standard model | - |
dc.identifier.url | https://www.sciencedirect.com/science/article/pii/S0020025516322290?via%3Dihub | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
222, Wangsimni-ro, Seongdong-gu, Seoul, 04763, Korea+82-2-2220-1365
COPYRIGHT © 2021 HANYANG UNIVERSITY.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.