Public Key Encryption with Delegated Equality Test in a Multi-User Setting

被引:91
|
作者
Ma, Sha [1 ]
Zhang, Mingwu [2 ,3 ]
Huang, Qiong [1 ]
Yang, Bo [4 ]
机构
[1] South China Agr Univ, Coll Informat, Guangzhou, Guangdong, Peoples R China
[2] Hubei Univ Technol, Sch Comp, Wuhan, Hubei, Peoples R China
[3] Chinese Acad Sci, Inst Informat Engn, State Key Lab Informat Secur, Beijing, Peoples R China
[4] Shaanxi Normal Univ, Sch Comp Sci, Xian, Shaanxi, Peoples R China
基金
高等学校博士学科点专项科研基金; 中国国家自然科学基金;
关键词
searchable encryption; delegated equality test; multi-user setting; type; 2; pairing; KEYWORD GUESSING ATTACKS; SECURE; SCHEMES;
D O I
10.1093/comjnl/bxu026
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Probabilistic public key encryption with equality test (PKEET), introduced by Yang et al. in CT-RSA 2010, is able to check whether two ciphertexts are encryptions of the same message under different public keys without leaking anything else about the message encrypted under either public key. PKEET schemes have many applications, for example, in constructing searchable encryption and partitioning encrypted data. Previous PKEET schemes lack a delegation mechanism for users to specify who can perform the equality test between their ciphertexts. In this paper, we propose the notion of public key encryption with delegated equality test (PKE-DET), which requires only the delegated party to deal with the work in a practical multi-user setting, and present a concrete construction in Type 2 pairing, which is provably secure under the newly introduced security notions.
引用
收藏
页码:986 / 1002
页数:17
相关论文
共 50 条
  • [1] Verifiable Public Key Encryption With Keyword Search Based on Homomorphic Encryption in Multi-User Setting
    Wu, D. N.
    Gan, Q. Q.
    Wang, X. M.
    IEEE ACCESS, 2018, 6 : 42445 - 42453
  • [2] Extend the Concept of Public Key Encryption with Delegated Search
    Tang, Qiang
    Ma, Hua
    Chen, Xiaofeng
    COMPUTER JOURNAL, 2015, 58 (04) : 724 - 734
  • [3] Public-Key Encryption with Keyword Search in Multi-user, Multi-challenge Setting under Adaptive Corruptions
    Ling, Yunhao
    Zhang, Kai
    Chen, Jie
    Huang, Qiong
    Qian, Haifeng
    PUBLIC-KEY CRYPTOGRAPHY, PT IV, PKC 2024, 2024, 14604 : 105 - 126
  • [4] Tightly Secure Public Key Encryption With Equality Test in Setting With Adaptive Corruptions
    Ling, Yunhao
    IEEE ACCESS, 2024, 12 : 115268 - 115276
  • [5] Efficient Public Key Encryption With Equality Test Supporting Flexible Authorization
    Ma, Sha
    Huang, Qiong
    Zhang, Mingwu
    Yang, Bo
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2015, 10 (03) : 458 - 470
  • [6] Hybrid Encryption in a Multi-user Setting, Revisited
    Giacon, Federico
    Kiltz, Eike
    Poettering, Bertram
    PUBLIC-KEY CRYPTOGRAPHY - PKC 2018, PT I, 2018, 10769 : 159 - 189
  • [7] Server-aided searchable encryption in multi-user setting
    Sun, Lixue
    Xu, Chunxiang
    Li, Chuang
    Li, Yuhui
    COMPUTER COMMUNICATIONS, 2020, 164 (164) : 25 - 30
  • [8] Probabilistic Public Key Encryption with Equality Test
    Yang, Guomin
    Tan, Chik How
    Huang, Qiong
    Wong, Duncan S.
    TOPICS IN CRYPTOLOGY - CT-RSA 2010, PROCEEDINGS, 2010, 5985 : 119 - +
  • [9] Lightweight Multi-User Public-Key Authenticated Encryption With Keyword Search
    Xu, Yongliang
    Cheng, Hang
    Li, Jiguo
    Liu, Ximeng
    Zhang, Xinpeng
    Wang, Meiqing
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2025, 20 : 3234 - 3246
  • [10] Revocable and anonymous searchable encryption in multi-user setting
    Miao, Yinbin
    Ma, Jianfeng
    Liu, Zhiquan
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2016, 28 (04) : 1204 - 1218