Public Key Encryption with Fuzzy Matching

被引:6
作者
Wang, Yuanhao [1 ]
Huang, Qiong [1 ]
Li, Hongbo [1 ]
Xiao, Meiyan [1 ]
Huang, Jianye [2 ]
Yang, Guomin [2 ]
机构
[1] South China Agr Univ, Coll Math & Informat, Guangzhou 510642, Guangdong, Peoples R China
[2] Univ Wollongong, Sch Comp & Informat Technol, Inst Cybersecur & Cryptol, Wollongong, NSW 2522, Australia
来源
PROVABLE AND PRACTICAL SECURITY, PROVSEC 2021 | 2021年 / 13059卷
基金
中国国家自然科学基金;
关键词
Cloud computing; Public key encryption; Fuzzy matching; Edit distance; Wildcard; IDENTITY-BASED ENCRYPTION; EQUALITY TEST; EFFICIENT; SCHEME;
D O I
10.1007/978-3-030-90402-9_3
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The rise of cloud computing is driving the development in various fields and becoming one of the hot topics in recent years. To solve the problem of comparing ciphertexts between different users in cloud storage, Public Key Encryption with Equality Test (PKEET) was proposed. In PKEET, a tester can determine whether two ciphertexts encrypted with different public keys contain the same message without decrypting the ciphertexts. However, PKEET only supports exact matching, which may not be practical when two messages have misspellings, formatting differences, or differences in the data itself. Therefore, to support fuzzy matching, in this paper we propose the concept of Public Key Encryption with Fuzzy Matching (PKEFM), which allows to determine whether the edit distance between two encrypted messages is less than a threshold value. PKEFM can be well applied to support fuzzy data comparison in encrypted e-mail systems or encrypted gene testing. We then modify the scheme to provide the decryption function, and support (encrypted) wildcards in the matching, in order to further improve the generality of PKEFM at the cost of a small amount of extra computation.
引用
收藏
页码:39 / 62
页数:24
相关论文
共 36 条
[1]  
Ateniese G., 2005, IACR CRYPTOLOGY EPRI, V2005, P385
[2]  
Boneh D, 2004, LECT NOTES COMPUT SC, V3027, P506
[3]  
Boneh D., 1998, Algorithmic Number Theory. Third International Symposium, ANTS-III. Proceedings, P48, DOI 10.1007/BFb0054851
[4]  
Boneh D, 2007, LECT NOTES COMPUT SC, V4392, P535
[5]  
De Caro A, 2011, IEEE SYMP COMP COMMU
[6]   Toward Efficient Multi-Keyword Fuzzy Search Over Encrypted Outsourced Data With Accuracy Improvement [J].
Fu, Zhangjie ;
Wu, Xinle ;
Guan, Chaowen ;
Sun, Xingming ;
Ren, Kui .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2016, 11 (12) :2706-2716
[7]  
Gusfield D., 1997, Algorithms on Strings, Trees, and Sequences-Computer Science and Computational Biology, DOI 10.1017/CBO9780511574931
[8]   PKE-AET: Public Key Encryption with Authorized Equality Test [J].
Huang, Kaibin ;
Tso, Raylin ;
Chen, Yu-Chi ;
Rahman, Sk Md Mizanur ;
Almogren, Ahmad ;
Alamri, Atif .
COMPUTER JOURNAL, 2015, 58 (10) :2686-2697
[9]  
LEVENSHT.VI, 1965, DOKL AKAD NAUK SSSR+, V163, P845
[10]   Authorized Equality Test on Identity-Based Ciphertexts for Secret Data Sharing via Cloud Storage [J].
Li, Hongbo ;
Huang, Qiong ;
Ma, Sha ;
Shen, Jian ;
Susilo, Willy .
IEEE ACCESS, 2019, 7 :25409-25421