413 0

CCA2 attack and modification of Huang et al.'s public key encryption with authorized equality test

Title
CCA2 attack and modification of Huang et al.'s public key encryption with authorized equality test
Author
서재홍
Keywords
public key encryption; authorized equality test; adaptive chosen ciphertext attack
Issue Date
2016-11
Publisher
OXFORD UNIV PRESS
Citation
The Computer Journal, V.59, No.11, Page.1689 - 1694
Abstract
In this article, we identify a flaw in Huang et al.'s public key encryption with authorized equality test (The Computer Journal, 2015). More precisely, we point out that the proof of the indistinguishability under adaptive chosen ciphertext attack (IND-CCA2) security for their scheme has a serious flaw. We illustrate this flaw by presenting a polynomial time CCA2 attack on their scheme. We also provide a solution to correct this flaw by modifying their scheme slightly. Our solution is quite efficient because it provides security against CCA2 attack by exploiting only the hash computation of a two times longer input without any increase in the sizes of ciphertexts and warrants.
URI
https://academic.oup.com/comjnl/article/59/11/1689/2433254https://repository.hanyang.ac.kr/handle/20.500.11754/101166
ISSN
0010-4620; 1460-2067
DOI
10.1093/comjnl/bxw033
Appears in Collections:
COLLEGE OF NATURAL SCIENCES[S](자연과학대학) > MATHEMATICS(수학과) > Articles
Files in This Item:
There are no files associated with this item.
Export
RIS (EndNote)
XLS (Excel)
XML


qrcode

Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.

BROWSE