Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | 서재홍 | - |
dc.date.accessioned | 2021-11-02T05:51:46Z | - |
dc.date.available | 2021-11-02T05:51:46Z | - |
dc.date.issued | 2020-04 | - |
dc.identifier.citation | INFORMATION SCIENCES, v. 516, page. 89-108 | en_US |
dc.identifier.issn | 0020-0255 | - |
dc.identifier.issn | 1872-6291 | - |
dc.identifier.uri | https://www.sciencedirect.com/science/article/pii/S0020025516322290?via%3Dihub | - |
dc.identifier.uri | https://repository.hanyang.ac.kr/handle/20.500.11754/166137 | - |
dc.description.abstract | Public key encryption with equality test (PKEET) is a cryptosystem that allows a tester who has trapdoors issued by one or more users Ui to perform equality tests on ciphertexts encrypted using public key(s) of Ui. Since this feature has a lot of practical applications including search on encrypted data, several PKEET schemes have been proposed so far. However, to the best of our knowledge, all the existing proposals are proven secure only under the hardness of number-theoretic problems and/or the random oracle heuristics. In this paper, we show that this primitive can be achieved not only generically from well-established other primitives but also even without relying on the random oracle heuristics. More precisely, our generic construction for PKEET employs a two-level hierarchical identity-based encryption scheme, which is selectively secure against chosen plaintext attacks, a strongly unforgeable one-time signature scheme and a cryptographic hash function. Our generic approach toward PKEET has several advantages over all the previous works; it directly leads the first standard model construction and also directly implies the first lattice-based construction. Finally, we show how to extend our approach to the identity-based setting. | en_US |
dc.description.sponsorship | The authors would like to thank anonymous reviewers for their helpful comments. Hyung Tae Lee would also like to thank Khoa Nguyen for his valuable suggestions to improve the previous version of this paper. This work was partially done while Hyung Tae Lee was with Nanyang Technological University, Singapore. Hyung Tae Lee, San Ling, and Huaxiong Wang were supported by Research Grant TL-9014101684-01 and the Singapore Ministry of Education under research grant MOE2016-T2-2-014(S). Hyung Tae Lee was also supported by Basic Science Research Program through the National Research Foundation of Korea (NRF) funded by the Ministry of Science and ICT (no. NRF-2018R1C1B6008476). Huaxiong Wang was also supported by NTU under Tier 1 grant RG143/14. Jae Hong Seo was supported by Institute for Information & communications Technology Promotion (IITP) grant funded by the Korea government (MSIT) (no. 2016-6-00600, A Study on Functional Encryption: Construction, Security Analysis, and Implementation). | en_US |
dc.language.iso | en | en_US |
dc.publisher | ELSEVIER SCIENCE INC | en_US |
dc.subject | Public key encryption with equality test | en_US |
dc.subject | Identity-based encryption with equality test | en_US |
dc.subject | Standard model | en_US |
dc.title | Public key encryption with equality test in the standard model | en_US |
dc.type | Article | en_US |
dc.relation.volume | 516 | - |
dc.identifier.doi | 10.1016/j.ins.2019.12.023 | - |
dc.relation.page | 89-108 | - |
dc.relation.journal | INFORMATION SCIENCES | - |
dc.contributor.googleauthor | Lee, Hyung Tae | - |
dc.contributor.googleauthor | Ling, San | - |
dc.contributor.googleauthor | Seo, Jae Hong | - |
dc.contributor.googleauthor | Wang, Huaxiong | - |
dc.contributor.googleauthor | Youn, Taek-Young | - |
dc.relation.code | 2020049090 | - |
dc.sector.campus | S | - |
dc.sector.daehak | COLLEGE OF NATURAL SCIENCES[S] | - |
dc.sector.department | DEPARTMENT OF MATHEMATICS | - |
dc.identifier.pid | jaehongseo | - |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.