CCA2 Attack and Modification of Huang et al.'s Public Key Encryption with Authorized Equality Test

被引:18
作者
Lee, Hyung Tae [1 ]
Ling, San [1 ]
Seo, Jae Hong [2 ]
Wang, Huaxiong [1 ]
机构
[1] Nanyang Technol Univ, Sch Phys & Math Sci, Div Math Sci, 21 Nanyang Link, Singapore 637371, Singapore
[2] Myongji Univ, Dept Math, Yongin 17058, Gyeonggi Do, South Korea
关键词
public key encryption; authorized equality test; adaptive chosen ciphertext attack;
D O I
10.1093/comjnl/bxw033
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In this article, we identify a flaw in Huang et al.'s public key encryption with authorized equality test (The Computer Journal, 2015). More precisely, we point out that the proof of the indistinguish-ability under adaptive chosen ciphertext attack (IND-CCA2) security for their scheme has a serious flaw. We illustrate this flaw by presenting a polynomial time CCA2 attack on their scheme. We also provide a solution to correct this flaw by modifying their scheme slightly. Our solution is quite efficient because it provides security against CCA2 attack by exploiting only the hash computation of a two times longer input without any increase in the sizes of ciphertexts and warrants.
引用
收藏
页码:1689 / 1694
页数:6
相关论文
共 8 条
  • [1] [Anonymous], INT J APPL CRYPTOGRA
  • [2] A PUBLIC KEY CRYPTOSYSTEM AND A SIGNATURE SCHEME BASED ON DISCRETE LOGARITHMS
    ELGAMAL, T
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 1985, 31 (04) : 469 - 472
  • [3] PKE-AET: Public Key Encryption with Authorized Equality Test
    Huang, Kaibin
    Tso, Raylin
    Chen, Yu-Chi
    Rahman, Sk Md Mizanur
    Almogren, Ahmad
    Alamri, Atif
    [J]. COMPUTER JOURNAL, 2015, 58 (10) : 2686 - 2697
  • [4] Public Key Encryption with Delegated Equality Test in a Multi-User Setting
    Ma, Sha
    Zhang, Mingwu
    Huang, Qiong
    Yang, Bo
    [J]. COMPUTER JOURNAL, 2015, 58 (04) : 986 - 1002
  • [5] Efficient Public Key Encryption With Equality Test Supporting Flexible Authorization
    Ma, Sha
    Huang, Qiong
    Zhang, Mingwu
    Yang, Bo
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2015, 10 (03) : 458 - 470
  • [6] Public key encryption supporting plaintext equality test and user-specified authorization
    Tang, Qiang
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2012, 5 (12) : 1351 - 1362
  • [7] Tang Q, 2011, LECT NOTES COMPUT SC, V6812, P389, DOI 10.1007/978-3-642-22497-3_25
  • [8] Yang GM, 2010, LECT NOTES COMPUT SC, V5985, P119, DOI 10.1007/978-3-642-11925-5_9