Skip to main content
Erschienen in: Designs, Codes and Cryptography 10/2021

28.08.2021

Public key encryption with filtered equality test revisited

verfasst von: Yu-Chi Chen, Xin Xie, Hung-Yu Tsao, Raylin Tso

Erschienen in: Designs, Codes and Cryptography | Ausgabe 10/2021

Einloggen, um Zugang zu erhalten

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Without revealing data in the plain, public key encryption with equality test can achieve the basic cryptographic functionalities required. However, the extended version, i.e., public encryption with filtered equality test (PKE-FET) can be used to only test the ciphertext only for some data. In this paper, we revisit the notion of PKE-FET on various security models. We provide a formal definition for the security of PKE-FET and present a new scheme to achieve a stronger level of security than the existing scheme.
Fußnoten
1
Assuming there are basketball, Lakers, and Los Angles under w. So, only the equality test of FCS only works with ciphertext of each of them.
 
Literatur
1.
Zurück zum Zitat Baek J., Safavi-Naini R., Susilo W.: Public key encryption with keyword search revisited. In Proceedings of the International Conference on Computational Science and Its Applications, pp. 1249–1259. Springer (2008). Baek J., Safavi-Naini R., Susilo W.: Public key encryption with keyword search revisited. In Proceedings of the International Conference on Computational Science and Its Applications, pp. 1249–1259. Springer (2008).
2.
Zurück zum Zitat Bellare M., Boldyreva A., Micali S.: Public-key encryption in a multi-user setting: security proofs and improvements. In: Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques, pp. 259–274. Springer (2000). Bellare M., Boldyreva A., Micali S.: Public-key encryption in a multi-user setting: security proofs and improvements. In: Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques, pp. 259–274. Springer (2000).
3.
Zurück zum Zitat Boneh D., Di Crescenzo G., Ostrovsky R., Persiano G.: Public key encryption with keyword search. In: Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques, pp. 506–522. Springer (2004). Boneh D., Di Crescenzo G., Ostrovsky R., Persiano G.: Public key encryption with keyword search. In: Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques, pp. 506–522. Springer (2004).
4.
Zurück zum Zitat Boneh D.: The decision Diffie–Hellman problem. In: Proceedings of the International Algorithmic Number Theory Symposium, pp. 48–63. Springer (1998). Boneh D.: The decision Diffie–Hellman problem. In: Proceedings of the International Algorithmic Number Theory Symposium, pp. 48–63. Springer (1998).
5.
Zurück zum Zitat Boneh D., Franklin M.: Identity-based encryption from the weil pairing. In: Proceedings of the Annual International Cryptology Conference, pp. 213–229. Springer (2001). Boneh D., Franklin M.: Identity-based encryption from the weil pairing. In: Proceedings of the Annual International Cryptology Conference, pp. 213–229. Springer (2001).
6.
Zurück zum Zitat Boneh D., Waters B.: Conjunctive, subset, and range queries on encrypted data. In: Proceedings of the Theory of Cryptography Conference, pp. 535–554. Springer (2007). Boneh D., Waters B.: Conjunctive, subset, and range queries on encrypted data. In: Proceedings of the Theory of Cryptography Conference, pp. 535–554. Springer (2007).
7.
Zurück zum Zitat Buccafurri F., Lax G., Sahu R.A., Saraswat V.: Practical and secure integrated pke+ peks with keyword privacy. In: Proceedings of the 2015 12th International Joint Conference on e-Business and Telecommunications (ICETE), vol. 4, pp. 448–453. IEEE (2015). Buccafurri F., Lax G., Sahu R.A., Saraswat V.: Practical and secure integrated pke+ peks with keyword privacy. In: Proceedings of the 2015 12th International Joint Conference on e-Business and Telecommunications (ICETE), vol. 4, pp. 448–453. IEEE (2015).
8.
Zurück zum Zitat Chatterjee S., Menezes A.: On cryptographic protocols employing asymmetric pairings—the role of \(\psi \) revisited. Discret. Appl. Math. 159(13), 1311–1322 (2011).MathSciNetCrossRef Chatterjee S., Menezes A.: On cryptographic protocols employing asymmetric pairings—the role of \(\psi \) revisited. Discret. Appl. Math. 159(13), 1311–1322 (2011).MathSciNetCrossRef
9.
Zurück zum Zitat Chen Y.-C.: Speks: secure server-designation public key encryption with keyword search against keyword guessing attacks. Comput. J. 58(4), 922–933 (2014).CrossRef Chen Y.-C.: Speks: secure server-designation public key encryption with keyword search against keyword guessing attacks. Comput. J. 58(4), 922–933 (2014).CrossRef
10.
Zurück zum Zitat Dittmann J., Lang A., Steinebach M., Katzenbeisser S.: Ecrypt-European network of excellence in cryptology, aspekte der sicherheit von mediendaten. In: Proceedings of the Sicherheit, pp. 89–192 (2005). Dittmann J., Lang A., Steinebach M., Katzenbeisser S.: Ecrypt-European network of excellence in cryptology, aspekte der sicherheit von mediendaten. In: Proceedings of the Sicherheit, pp. 89–192 (2005).
11.
Zurück zum Zitat Fouque P.-A., Joux A., Mavromati C.: Multi-user collisions: applications to discrete logarithm, even-mansour and prince. In: Proceedings of the International Conference on the Theory and Application of Cryptology and Information Security, pp. 420–438. Springer (2014). Fouque P.-A., Joux A., Mavromati C.: Multi-user collisions: applications to discrete logarithm, even-mansour and prince. In: Proceedings of the International Conference on the Theory and Application of Cryptology and Information Security, pp. 420–438. Springer (2014).
12.
Zurück zum Zitat Huang K., Tso R., Chen Y.-C., Li W., Sun H.-M.: A new public key encryption with equality test. In: Proceedings of the International Conference on Network and System Security, pp. 550–557. Springer (2015). Huang K., Tso R., Chen Y.-C., Li W., Sun H.-M.: A new public key encryption with equality test. In: Proceedings of the International Conference on Network and System Security, pp. 550–557. Springer (2015).
13.
Zurück zum Zitat Huang K., Tso R., Chen Y.-C., Mizanur S.M., Rahman A.A., Alamri A.: Pke-aet: public key encryption with authorized equality test. Comput. J. 58(10), 2686–2697 (2015).CrossRef Huang K., Tso R., Chen Y.-C., Mizanur S.M., Rahman A.A., Alamri A.: Pke-aet: public key encryption with authorized equality test. Comput. J. 58(10), 2686–2697 (2015).CrossRef
14.
Zurück zum Zitat Huang K., Tso R., Chen Y.-C.: Somewhat semantic secure public key encryption with filtered-equality-test in the standard model and its extension to searchable encryption. J. Comput. Syst. Sci. 89, 400–409 (2017).MathSciNetCrossRef Huang K., Tso R., Chen Y.-C.: Somewhat semantic secure public key encryption with filtered-equality-test in the standard model and its extension to searchable encryption. J. Comput. Syst. Sci. 89, 400–409 (2017).MathSciNetCrossRef
15.
Zurück zum Zitat Ma S.: Identity-based encryption with outsourced equality test in cloud computing. Inf. Sci. 328, 389–402 (2016).CrossRef Ma S.: Identity-based encryption with outsourced equality test in cloud computing. Inf. Sci. 328, 389–402 (2016).CrossRef
16.
Zurück zum Zitat Ma S., Huang Q., Zhang M., Yang B.: Efficient public key encryption with equality test supporting flexible authorization. IEEE Trans. Inf. Forensic Secur. 10(3), 458–470 (2014).CrossRef Ma S., Huang Q., Zhang M., Yang B.: Efficient public key encryption with equality test supporting flexible authorization. IEEE Trans. Inf. Forensic Secur. 10(3), 458–470 (2014).CrossRef
17.
Zurück zum Zitat Ma S., Zhang M., Huang Q., Yang B.: Public key encryption with delegated equality test in a multi-user setting. Comput. J. 58(4), 986–1002 (2015).CrossRef Ma S., Zhang M., Huang Q., Yang B.: Public key encryption with delegated equality test in a multi-user setting. Comput. J. 58(4), 986–1002 (2015).CrossRef
18.
Zurück zum Zitat Ming Y., Wang E.: Identity-based encryption with filtered equality test for smart city applications. Sensors 19(14), 3046 (2019).CrossRef Ming Y., Wang E.: Identity-based encryption with filtered equality test for smart city applications. Sensors 19(14), 3046 (2019).CrossRef
19.
Zurück zum Zitat Park D.J., Kim K., Lee P.J.: Public key encryption with conjunctive field keyword search. In: Proceedings of the International Workshop on Information Security Applications, pp. 73–86. Springer (2004). Park D.J., Kim K., Lee P.J.: Public key encryption with conjunctive field keyword search. In: Proceedings of the International Workshop on Information Security Applications, pp. 73–86. Springer (2004).
20.
Zurück zum Zitat Peng K., Boyd C., Dawson E., Lee B.: Ciphertext comparison, a new solution to the millionaire problem. In: Proceedings of the International Conference on Information and Communications Security, pp. 84–96. Springer (2005). Peng K., Boyd C., Dawson E., Lee B.: Ciphertext comparison, a new solution to the millionaire problem. In: Proceedings of the International Conference on Information and Communications Security, pp. 84–96. Springer (2005).
22.
Zurück zum Zitat Tang Q.: Public key encryption schemes supporting equality test with authorisation of different granularity. Int. J. Appl. Cryptogr. 2(4), 304–321 (2012).MathSciNetCrossRef Tang Q.: Public key encryption schemes supporting equality test with authorisation of different granularity. Int. J. Appl. Cryptogr. 2(4), 304–321 (2012).MathSciNetCrossRef
23.
Zurück zum Zitat Tang Q.: Public key encryption supporting plaintext equality test and user-specified authorization. Secur. Commun. Netw. 5(12), 1351–1362 (2012).CrossRef Tang Q.: Public key encryption supporting plaintext equality test and user-specified authorization. Secur. Commun. Netw. 5(12), 1351–1362 (2012).CrossRef
24.
Zurück zum Zitat Yang G., Tan C.H., Huang Q., Wong D.S.: Probabilistic public key encryption with equality test. In: Proceedings of the Cryptographers’ Track at the RSA Conference, pp. 119–131. Springer (2010). Yang G., Tan C.H., Huang Q., Wong D.S.: Probabilistic public key encryption with equality test. In: Proceedings of the Cryptographers’ Track at the RSA Conference, pp. 119–131. Springer (2010).
Metadaten
Titel
Public key encryption with filtered equality test revisited
verfasst von
Yu-Chi Chen
Xin Xie
Hung-Yu Tsao
Raylin Tso
Publikationsdatum
28.08.2021
Verlag
Springer US
Erschienen in
Designs, Codes and Cryptography / Ausgabe 10/2021
Print ISSN: 0925-1022
Elektronische ISSN: 1573-7586
DOI
https://doi.org/10.1007/s10623-021-00924-1

Weitere Artikel der Ausgabe 10/2021

Designs, Codes and Cryptography 10/2021 Zur Ausgabe

Premium Partner