Semi-Generic Construction of Public Key Encryption and Identity-Based Encryption with Equality Test
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Lee, Hyung Tae | - |
dc.contributor.author | Ling, San | - |
dc.contributor.author | Seo, Jae Hong | - |
dc.contributor.author | Wang, Huaxiong | - |
dc.date.accessioned | 2022-07-14T23:49:58Z | - |
dc.date.available | 2022-07-14T23:49:58Z | - |
dc.date.created | 2021-05-14 | - |
dc.date.issued | 2016-12 | - |
dc.identifier.issn | 0020-0255 | - |
dc.identifier.uri | https://scholarworks.bwise.kr/hanyang/handle/2021.sw.hanyang/153305 | - |
dc.description.abstract | Public key encryption with equality test (PKEET), which was first introduced by Yang et al. (CT-RSA, 2010), has various applications including facilitating keyword search on encrypted data and partitioning encrypted data on the cloud. It can be also applied to manage personal health records on the internet. For these reasons, there have been improvements on earlier PKEET schemes in terms of performance and functionality. We present a semi-generic method for PKEET constructions, assuming only the existence of IND-CCA2 secure traditional public key encryption (PKE) schemes, the hardness of Computational Diffie-Hellman (CDH) problems, and random oracles. Our approach has several advantages; it enables us to understand requirements for the equality test functionality more clearly. Furthermore, our approach is quite general, in that if we change the underlying PKE scheme with the identity-based encryption (IBE) scheme (and we assume the hardness of Bilinear Diffie-Hellman problems instead of CDH), then we obtain the first IBE scheme with equality test (IBEET) satisfying analogous security arguments to those of PKEET. Although an IBEET construction was recently proposed, but we note that it satisfies only weak security requirements. | - |
dc.language | 영어 | - |
dc.language.iso | en | - |
dc.publisher | ELSEVIER SCIENCE INC | - |
dc.title | Semi-Generic Construction of Public Key Encryption and Identity-Based Encryption with Equality Test | - |
dc.type | Article | - |
dc.contributor.affiliatedAuthor | Seo, Jae Hong | - |
dc.identifier.doi | 10.1016/j.ins.2016.09.013 | - |
dc.identifier.scopusid | 2-s2.0-84987973291 | - |
dc.identifier.wosid | 000385470400025 | - |
dc.identifier.bibliographicCitation | INFORMATION SCIENCES, v.373, pp.419 - 440 | - |
dc.relation.isPartOf | INFORMATION SCIENCES | - |
dc.citation.title | INFORMATION SCIENCES | - |
dc.citation.volume | 373 | - |
dc.citation.startPage | 419 | - |
dc.citation.endPage | 440 | - |
dc.type.rims | ART | - |
dc.type.docType | 정기학술지(Article(Perspective Article포함)) | - |
dc.description.journalClass | 1 | - |
dc.description.isOpenAccess | Y | - |
dc.description.journalRegisteredClass | scie | - |
dc.description.journalRegisteredClass | scopus | - |
dc.relation.journalResearchArea | Computer Science | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Information Systems | - |
dc.subject.keywordPlus | Bilinear Diffie-Hellman problem | - |
dc.subject.keywordPlus | Equality tests | - |
dc.subject.keywordPlus | Generic construction | - |
dc.subject.keywordPlus | Identity Based Encryption | - |
dc.subject.keywordPlus | Personal health record | - |
dc.subject.keywordPlus | Public-key encryption | - |
dc.subject.keywordPlus | Random Oracle model | - |
dc.subject.keywordPlus | Security requirements | - |
dc.subject.keywordAuthor | Public key encryption | - |
dc.subject.keywordAuthor | Identity-based encryption | - |
dc.subject.keywordAuthor | Equality test | - |
dc.subject.keywordAuthor | Random oracle model | - |
dc.identifier.url | https://www.sciencedirect.com/science/article/pii/S0020025516307654?via%3Dihub | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
222, Wangsimni-ro, Seongdong-gu, Seoul, 04763, Korea+82-2-2220-1365
COPYRIGHT © 2021 HANYANG UNIVERSITY.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.