CCA2 attack and modification of Huang et al.'s public key encryption with authorized equality test
- Authors
- Lee, Hyung Tae; Ling, San; Seo, Jae Hong; Wang, Huaxiong
- Issue Date
- Nov-2016
- Publisher
- OXFORD UNIV PRESS
- Keywords
- public key encryption; authorized equality test; adaptive chosen ciphertext attack
- Citation
- COMPUTER JOURNAL, v.59, no.11, pp.1689 - 1694
- Indexed
- SCIE
SCOPUS
- Journal Title
- COMPUTER JOURNAL
- Volume
- 59
- Number
- 11
- Start Page
- 1689
- End Page
- 1694
- URI
- https://scholarworks.bwise.kr/hanyang/handle/2021.sw.hanyang/153551
- DOI
- 10.1093/comjnl/bxw033
- ISSN
- 0010-4620
- Abstract
- In this article, we identify a flaw in Huang et al.'s public key encryption with authorized equality test (The Computer Journal, 2015). More precisely, we point out that the proof of the indistinguish-ability under adaptive chosen ciphertext attack (IND-CCA2) security for their scheme has a serious flaw. We illustrate this flaw by presenting a polynomial time CCA2 attack on their scheme. We also provide a solution to correct this flaw by modifying their scheme slightly. Our solution is quite efficient because it provides security against CCA2 attack by exploiting only the hash computation of a two times longer input without any increase in the sizes of ciphertexts and warrants.
- Files in This Item
-
Go to Link
- Appears in
Collections - 서울 자연과학대학 > 서울 수학과 > 1. Journal Articles
![qrcode](https://api.qrserver.com/v1/create-qr-code/?size=55x55&data=https://scholarworks.bwise.kr/hanyang/handle/2021.sw.hanyang/153551)
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.