Security Analysis and Modification of ID-Based Encryption with Equality Test from ACISP 2017

被引:14
作者
Lee, Hyung Tae [1 ]
Wang, Huaxiong [2 ]
Zhang, Kai [3 ,4 ]
机构
[1] Chonbuk Natl Univ, Coll Engn, Div Comp Sci & Engn, Jeonju, South Korea
[2] Nanyang Technol Univ, Sch Phys & Math Sci, Div Math Sci, Singapore, Singapore
[3] Shanghai Univ Elect Power, Coll Comp Sci & Technol, Dept Informat Secur, Shanghai, Peoples R China
[4] Anhui Univ, Coinnovat Ctr Informat Supply & Assurance Technol, Hefei, Peoples R China
来源
INFORMATION SECURITY AND PRIVACY | 2018年 / 10946卷
基金
新加坡国家研究基金会;
关键词
IDENTITY-BASED ENCRYPTION;
D O I
10.1007/978-3-319-93638-3_46
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
AT ACISP 2017, Wu et al. provided an identity-based encryption scheme with equality test that considers to prevent insider attacks. In this paper, we demonstrate that their scheme does not achieve the claimed security requirement by presenting an attack. Subsequently, we provide a modification of their construction.
引用
收藏
页码:780 / 786
页数:7
相关论文
共 7 条
[1]  
[Anonymous], 2016, IACR CRYPTOL EPRINT
[2]  
Katz J., 2008, Introduction to modern cryptography
[3]  
Lee H.T., 2018, IACR CRYPTOL, V2018, P369
[4]   Semi-generic construction of public key encryption and identity-based encryption with equality test [J].
Lee, Hyung Tae ;
Ling, San ;
Seo, Jae Hong ;
Wang, Huaxiong .
INFORMATION SCIENCES, 2016, 373 :419-440
[5]   Identity-based encryption with outsourced equality test in cloud computing [J].
Ma, Sha .
INFORMATION SCIENCES, 2016, 328 :389-402
[6]   Efficient and secure identity-based encryption scheme with equality test in cloud computing [J].
Wu, Libing ;
Zhang, Yubo ;
Choo, Kim-Kwang Raymond ;
He, Debiao .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2017, 73 :22-31
[7]   ID-Based Encryption with Equality Test Against Insider Attack [J].
Wu, Tong ;
Ma, Sha ;
Mu, Yi ;
Zeng, Shengke .
INFORMATION SECURITY AND PRIVACY, ACISP 2017, PT I, 2017, 10342 :168-183