The public key encryption with equality test (PKEET) allows the cloud server to judge whether two different ciphertexts are generated by the same message without decryption. Through this technique, PKEET provides an effective solution for building secure outsourced databases, and has made some rich achievements. This paper combines multivariate public key encryption and equality test, and proposes the first multivariate public key encryption scheme with equality test (MPKEET), which inherits the advantages of both primitives. Moreover, the equality test algorithm proposed in this paper is based on a straight line. Compared with the schemes based on bilinear pairing, it is simpler and easier to implement. And our MPKEET scheme achieves desirable security, which can resist linearization equation attacks, differential attacks, XL attacks, Gröbner basis attacks and the attack of quantum computer, when appropriate parameters are selected.INDEX TERMS Equality test, multivariate, public key encryption, security.
Dual receiver encryption (DRE), being originally conceived at CCS 2004 as a proof technique, enables a ciphertext to be decrypted to the same plaintext by two different but dual receivers and becomes popular recently due to itself useful application potentials such secure outsourcing, trusted third party supervising, client puzzling, etc. Identity-based DRE (IB-DRE) further combines the bilateral advantages/facilities of DRE and identity-based encryption (IBE). Most previous constructions of IB-DRE are based on bilinear pairings, and thus suffers from known quantum algorithmic attacks. It is interesting to build IB-DRE schemes based on the well-known post quantum platforms, such as lattices. At ACISP 2018, Zhang et al. gave the first lattice-based construction of IB-DRE, and the main part of the public parameter in this scheme consists of 2 n + 2 matrices where n is the bit-length of arbitrary identity. In this paper, by introducing an injective map and a homomorphic computation technique due to Yamada at EUROCRYPT 2016, we propose another lattice-based construction of IB-DRE in an even efficient manner: The main part of the public parameters consists only of 2 p n 1 p + 2 matrices of the same dimensions, where p ( ≥ 2 ) is a flexible constant. The larger the p and n, the more observable of our proposal. Typically, when p = 2 and n = 284 according to the suggestion given by Peikert et al., the size of public parameters in our proposal is reduced to merely 12% of Zhang et al.’s method. In addition, to lighten the pressure of key generation center, we extend our lattice-based IB-DRE scheme to hierarchical scenario. Finally, both the IB-DRE scheme and the HIB-DRE scheme are proved to be indistinguishable against adaptively chosen identity and plaintext attacks (IND-ID-CPA).
BackgroundUsing daily monitoring of environmental surfaces and personal protective equipment (PPE), we found an increase in environmental contamination since August 18, 2021, in a designated hospital for COVID-19 patients in China, which may lead to an increased risk of exposure to medical staff.MethodsTo investigate the cause of increased environmental contamination and effect of our intervention, we obtained environmental samples at pre-intervention (August 18–21, 2021) and post-intervention (August 22–28, 2021) from six infection isolation rooms with windows for ventilation and other auxiliary areas at 105 and 129 sites before routine daily cleaning, respectively. In addition, we obtained PPE samples from 98 medical staff exiting the patient rooms/contaminated areas at 482 sites. Between August 22 and 24, 2021, we took measures to reduce environmental contamination based on sampling and inspection results.FindingsAt pre-intervention, the positivity rates for contamination of environmental surfaces and PPE samples were significantly higher for critical patients (37.21 and 27.86%, respectively) than severely ill patients (25.00 and 12.50%, respectively) and moderately ill patients (0.00 and 0.00%, respectively) (Pearson's Chi-square: χ2 = 15.560, p = 0.000; Fisher's exact test: χ2 = 9.358, p = 0.007). Therefore, we inferred that the source of contamination of environmental surfaces and PPE was mainly the room of critically ill patients, likely through the hands of medical staff to the potentially contaminated areas. A critically ill patient had emergency tracheal intubation and rescue on August 18, 2021, due to worsened patient condition. The ventilator tube used for first aid did not match the ventilator, and the ventilator tube fell off multiple times on August 18–21, 2021, which may explain the increased contamination of environmental surfaces and PPE from critically ill patients, as well as lead to indirect contamination of potentially contaminated areas. The contamination positivity rates of environmental surfaces and PPE were reduced by replacing the appropriate ventilator catheter, limiting the number of people entering the isolation room simultaneously, increasing the frequency of environmental disinfection, standardizing the undressing process, setting up undressing monitoring posts to supervise the undressing process, and preventing the spread of virus infections in the hospital during an epidemic.ConclusionsSevere acute respiratory syndrome coronavirus 2 (SARS-CoV-2) was spread on object surfaces in isolation rooms mainly by touch, and the contamination of environmental surfaces and PPE was greater in rooms of patients with greater disease severity and higher surface touch frequency. Therefore, strict protective measures for medical staff, frequent environmental cleaning for isolation rooms, and compliance with mask wearing by patients when conditions permit should be advised to prevent SARS-CoV-2 spread in hospitals.
Identity-based encryption (IBE), and its hierarchical extension (HIBE), are interesting cryptographic primitives that aim at the implicit authentication on the users’ public keys by using users’ identities directly. During the past several decades, numerous elegant pairing-based (H)IBE schemes were proposed. However, most pairing-related security assumptions suffer from known quantum algorithmic attacks. Therefore, the construction of lattice-based (H)IBE became one of the hot directions in recent years. In the setting of most existing lattice-based (H)IBE schemes, each bit of a user’s identity is always associated with a parameter matrix. This always leads to drastic but unfavorable increases in the sizes of the system public parameters. To overcome this issue, we propose a flexible trade-off mechanism between the size of the public parameters and the involved computational cost using the blocking technique. More specifically, we divide an identity into l′ segments and associate each segment with a matrix, while increasing the lattice modulo slightly for maintaining the same security level. As a result, for the setting of 160-bit identities, we show that the size of the public parameters can be reduced by almost 89.7% (resp. 93.8%) while increasing the computational cost by merely 5.2% (resp. 12.25%) when l′ is a set of 16 (resp. 8). Finally, our IBE scheme is extended to an HIBE scheme, and both of them are proved to achieve the indistinguishability of ciphertexts against adaptively chosen identity and chosen plaintext attack (IND-ID-CPA) in the standard model, assuming that the well-known ring learning with error (RLWE) problem over the involved ideal lattices is intractable, even in the post-quantum era.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2025 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.