A General Two-Server Framework for Ciphertext-Checkable Encryption Against Offline Message Recovery Attack

被引:10
作者
Ling, Yunhao [1 ]
Ma, Sha [1 ]
Huang, Qiong [1 ]
Li, Ximing [1 ]
机构
[1] South China Agr Univ, Coll Math & Informat, Guangzhou, Guangdong, Peoples R China
来源
CLOUD COMPUTING AND SECURITY, PT III | 2018年 / 11065卷
基金
中国国家自然科学基金;
关键词
Ciphertext-checkable encryption; Offline message recovery attack; Smooth projective hash function; PUBLIC-KEY ENCRYPTION; IDENTITY-BASED ENCRYPTION; EQUALITY TEST;
D O I
10.1007/978-3-030-00012-7_34
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In CT-RSA 2010, Yang et al. proposed a notion of public key encryption with equality test (PKEET), which allows a tester to check whether two ciphertexts encrypted under different public keys as well as the same public key contain the same message. Then various PKEET schemes are proposed to enforce authorization mechanisms for users to specify who can perform equality test on their ciphertexts. However, it is still an open problem for PKEET to resist offline message recovery attack until now. In this paper, we introduce a general two-server framework for ciphertext-checkable encryption scheme to withstand offline message recovery attack. Furthermore, it has a nice property of flexible authorization and supports checking two types of equations on the ciphertexts of Mi and Mj under different public keys as well as the same public key: aM(i) = bM(j) and M-i(a) = M-j(b), where a and b are integers.
引用
收藏
页码:370 / 382
页数:13
相关论文
共 22 条
  • [1] [Anonymous], 2016, IACR CRYPTOL EPRINT, DOI DOI 10.1016/J.COMCOM.2021.02.006
  • [2] [Anonymous], 2017, INT J COMMUNICATION
  • [3] Boneh D, 2004, LECT NOTES COMPUT SC, V3027, P506
  • [4] Dual-Server Public-Key Encryption With Keyword Search for Secure Cloud Storage
    Chen, Rongmao
    Mu, Yi
    Yang, Guomin
    Guo, Fuchun
    Wang, Xiaofen
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2016, 11 (04) : 789 - 798
  • [5] A New General Framework for Secure Public Key Encryption with Keyword Search
    Chen, Rongmao
    Mu, Yi
    Yang, Guomin
    Guo, Fuchun
    Wang, Xiaofen
    [J]. INFORMATION SECURITY AND PRIVACY (ACISP 2015), 2015, 9144 : 59 - 76
  • [6] Cramer R, 2002, LECT NOTES COMPUT SC, V2332, P45
  • [7] PKE-AET: Public Key Encryption with Authorized Equality Test
    Huang, Kaibin
    Tso, Raylin
    Chen, Yu-Chi
    Rahman, Sk Md Mizanur
    Almogren, Ahmad
    Alamri, Atif
    [J]. COMPUTER JOURNAL, 2015, 58 (10) : 2686 - 2697
  • [8] Huang KB, 2014, LECT NOTES COMPUT SC, V8792, P550, DOI 10.1007/978-3-319-11698-3_45
  • [9] An efficient public-key searchable encryption scheme secure against inside keyword guessing attacks
    Huang, Qiong
    Li, Hongbo
    [J]. INFORMATION SCIENCES, 2017, 403 : 1 - 14
  • [10] Lee H. T., 2016, 20161182 IACR CRYPT