CCA2 attack and modification of Huang et al.'s public key encryption with authorized equality test
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Lee, Hyung Tae | - |
dc.contributor.author | Ling, San | - |
dc.contributor.author | Seo, Jae Hong | - |
dc.contributor.author | Wang, Huaxiong | - |
dc.date.accessioned | 2022-07-15T04:15:05Z | - |
dc.date.available | 2022-07-15T04:15:05Z | - |
dc.date.created | 2021-05-14 | - |
dc.date.issued | 2016-11 | - |
dc.identifier.issn | 0010-4620 | - |
dc.identifier.uri | https://scholarworks.bwise.kr/hanyang/handle/2021.sw.hanyang/153551 | - |
dc.description.abstract | In this article, we identify a flaw in Huang et al.'s public key encryption with authorized equality test (The Computer Journal, 2015). More precisely, we point out that the proof of the indistinguish-ability under adaptive chosen ciphertext attack (IND-CCA2) security for their scheme has a serious flaw. We illustrate this flaw by presenting a polynomial time CCA2 attack on their scheme. We also provide a solution to correct this flaw by modifying their scheme slightly. Our solution is quite efficient because it provides security against CCA2 attack by exploiting only the hash computation of a two times longer input without any increase in the sizes of ciphertexts and warrants. | - |
dc.language | 영어 | - |
dc.language.iso | en | - |
dc.publisher | OXFORD UNIV PRESS | - |
dc.title | CCA2 attack and modification of Huang et al.'s public key encryption with authorized equality test | - |
dc.type | Article | - |
dc.contributor.affiliatedAuthor | Seo, Jae Hong | - |
dc.identifier.doi | 10.1093/comjnl/bxw033 | - |
dc.identifier.scopusid | 2-s2.0-85016061736 | - |
dc.identifier.wosid | 000397052700008 | - |
dc.identifier.bibliographicCitation | COMPUTER JOURNAL, v.59, no.11, pp.1689 - 1694 | - |
dc.relation.isPartOf | COMPUTER JOURNAL | - |
dc.citation.title | COMPUTER JOURNAL | - |
dc.citation.volume | 59 | - |
dc.citation.number | 11 | - |
dc.citation.startPage | 1689 | - |
dc.citation.endPage | 1694 | - |
dc.type.rims | ART | - |
dc.type.docType | 정기학술지(Article(Perspective Article포함)) | - |
dc.description.journalClass | 1 | - |
dc.description.isOpenAccess | N | - |
dc.description.journalRegisteredClass | scie | - |
dc.description.journalRegisteredClass | scopus | - |
dc.relation.journalResearchArea | Computer Science | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Hardware & Architecture | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Information Systems | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Software Engineering | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Theory & Methods | - |
dc.subject.keywordPlus | Polynomial approximation | - |
dc.subject.keywordPlus | Public key cryptography | - |
dc.subject.keywordPlus | Security of data | - |
dc.subject.keywordAuthor | public key encryption | - |
dc.subject.keywordAuthor | authorized equality test | - |
dc.subject.keywordAuthor | adaptive chosen ciphertext attack | - |
dc.identifier.url | https://academic.oup.com/comjnl/article/59/11/1689/2433254 | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
222, Wangsimni-ro, Seongdong-gu, Seoul, 04763, Korea+82-2-2220-1365
COPYRIGHT © 2021 HANYANG UNIVERSITY.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.