Public Key Encryption with Delegated Equality Test in a Multi-User Setting

被引:89
|
作者
Ma, Sha [1 ]
Zhang, Mingwu [2 ,3 ]
Huang, Qiong [1 ]
Yang, Bo [4 ]
机构
[1] South China Agr Univ, Coll Informat, Guangzhou, Guangdong, Peoples R China
[2] Hubei Univ Technol, Sch Comp, Wuhan, Hubei, Peoples R China
[3] Chinese Acad Sci, Inst Informat Engn, State Key Lab Informat Secur, Beijing, Peoples R China
[4] Shaanxi Normal Univ, Sch Comp Sci, Xian, Shaanxi, Peoples R China
来源
COMPUTER JOURNAL | 2015年 / 58卷 / 04期
基金
高等学校博士学科点专项科研基金; 中国国家自然科学基金;
关键词
searchable encryption; delegated equality test; multi-user setting; type; 2; pairing; KEYWORD GUESSING ATTACKS; SECURE; SCHEMES;
D O I
10.1093/comjnl/bxu026
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Probabilistic public key encryption with equality test (PKEET), introduced by Yang et al. in CT-RSA 2010, is able to check whether two ciphertexts are encryptions of the same message under different public keys without leaking anything else about the message encrypted under either public key. PKEET schemes have many applications, for example, in constructing searchable encryption and partitioning encrypted data. Previous PKEET schemes lack a delegation mechanism for users to specify who can perform the equality test between their ciphertexts. In this paper, we propose the notion of public key encryption with delegated equality test (PKE-DET), which requires only the delegated party to deal with the work in a practical multi-user setting, and present a concrete construction in Type 2 pairing, which is provably secure under the newly introduced security notions.
引用
收藏
页码:986 / 1002
页数:17
相关论文
共 50 条
  • [1] Public-key encryption in a multi-user setting: Security proofs and improvements
    Bellare, M
    Boldyreva, A
    Micali, S
    [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2000, 2000, 1807 : 259 - 274
  • [2] Verifiable Public Key Encryption With Keyword Search Based on Homomorphic Encryption in Multi-User Setting
    Wu, D. N.
    Gan, Q. Q.
    Wang, X. M.
    [J]. IEEE ACCESS, 2018, 6 : 42445 - 42453
  • [3] A lattice-based public key encryption scheme with delegated equality test
    Xiao, Kaifeng
    Chen, Xinjian
    Huang, Jianye
    Li, Hongbo
    Huang, Qiong
    [J]. COMPUTER STANDARDS & INTERFACES, 2024, 87
  • [4] Public key signatures in the multi-user setting
    Galbraith, S
    Malone-Lee, J
    Smart, NP
    [J]. INFORMATION PROCESSING LETTERS, 2002, 83 (05) : 263 - 266
  • [5] Hybrid Encryption in a Multi-user Setting, Revisited
    Giacon, Federico
    Kiltz, Eike
    Poettering, Bertram
    [J]. PUBLIC-KEY CRYPTOGRAPHY - PKC 2018, PT I, 2018, 10769 : 159 - 189
  • [6] Public-Key Encryption with Keyword Search in Multi-user, Multi-challenge Setting under Adaptive Corruptions
    Ling, Yunhao
    Zhang, Kai
    Chen, Jie
    Huang, Qiong
    Qian, Haifeng
    [J]. PUBLIC-KEY CRYPTOGRAPHY, PT IV, PKC 2024, 2024, 14604 : 105 - 126
  • [7] Tightly Secure Public Key Encryption With Equality Test in Setting With Adaptive Corruptions
    Ling, Yunhao
    [J]. IEEE ACCESS, 2024, 12 : 115268 - 115276
  • [8] Lattice-based public-key encryption with conjunctive keyword search in multi-user setting for IIoT
    Tang, Yongli
    Ba, Yanpeng
    Li, Lixiang
    Wang, Xiaojun
    Yan, Xixi
    [J]. CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2022, 25 (04): : 2305 - 2316
  • [9] Lattice-based public-key encryption with conjunctive keyword search in multi-user setting for IIoT
    Yongli Tang
    Yanpeng Ba
    Lixiang Li
    Xiaojun Wang
    Xixi Yan
    [J]. Cluster Computing, 2022, 25 : 2305 - 2316
  • [10] Certificateless public key encryption with equality test
    Qu, Haipeng
    Yan, Zhen
    Lin, Xi-Jun
    Zhang, Qi
    Sun, Lin
    [J]. INFORMATION SCIENCES, 2018, 462 : 76 - 92