Please use this identifier to cite or link to this item:
https://hdl.handle.net/10356/142922
Title: | Public key encryption with equality test from generic assumptions in the random oracle model | Authors: | Lee, Hyung Tae Ling, San Seo, Jae Hong Wang, Huaxiong |
Keywords: | Science::Mathematics | Issue Date: | 2019 | Source: | Lee, H. T., Ling, S., Seo, J. H., & Wang, H. (2019). Public key encryption with equality test from generic assumptions in the random oracle model. Information Sciences, 500, 15-33. doi:10.1016/j.ins.2019.05.026 | Journal: | Information Sciences | Abstract: | Public key encryption with equality test (PKEET) is a variant of classical public key encryption (PKE) with the special functionality of an equality test, and can be used in many applications such as in keyword search on encrypted data and for efficient management by partitioning encrypted data in the cloud. Since the original proposal of Yang et al. (CT-RSA, 2010), several subsequent proposals to improve the efficiency or functionality of PKEET have been reported. We present a PKEET construction from generic assumptions in the random oracle model. In particular, whereas previous results require number-theoretic assumptions or strictly stronger generic assumptions such as the existence of secure hierarchical identity-based encryption, our proposal requires only the existence of cryptographic hash functions and secure PKE schemes satisfying a special property, called randomness extractability. Informally, randomness extractability means that one can recover the randomness used in a ciphertext when given a secret key corresponding to a public key for the ciphertext. We investigate the fact that PKE schemes satisfying this property can be designed by the Fujisaki-Okamoto (FO) transformation, which is the widely utilized method to obtain secure PKE schemes from basic cryptographic primitives in the random oracle model. As a result, in combination with the FO transformation, we obtain a PKEET construction in the random oracle model if there exist a one-way PKE scheme, a one-time secure symmetric key encryption scheme, collision-resistant and one-way hash functions, and a pseudorandom function. In this sense, we remark that our PKEET construction is derived from fundamental generic assumptions only. | URI: | https://hdl.handle.net/10356/142922 | ISSN: | 0020-0255 | DOI: | 10.1016/j.ins.2019.05.026 | Schools: | School of Physical and Mathematical Sciences | Organisations: | Strategic Centre for Research in Privacy-Preserving Technologies & Systems | Research Centres: | Research Techno Plaza | Rights: | © 2019 Elsevier Inc. All rights reserved. This paper was published in Information Sciences and is made available with permission of Elsevier Inc. | Fulltext Permission: | open | Fulltext Availability: | With Fulltext |
Appears in Collections: | SPMS Journal Articles |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
GenericPKEETinRO-InfoSci-2ndRevision-V2.pdf | 391.38 kB | Adobe PDF | ![]() View/Open |
SCOPUSTM
Citations
20
18
Updated on Mar 18, 2025
Web of ScienceTM
Citations
20
10
Updated on Oct 30, 2023
Page view(s)
342
Updated on Mar 18, 2025
Download(s) 50
134
Updated on Mar 18, 2025
Google ScholarTM
Check
Altmetric
Items in DR-NTU are protected by copyright, with all rights reserved, unless otherwise indicated.