2022
DOI: 10.1007/978-3-031-20917-8_1
|View full text |Cite
|
Sign up to set email alerts
|

A Generic Construction of CCA-Secure Attribute-Based Encryption with Equality Test

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
1
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
2
2

Relationship

2
2

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 32 publications
0
1
0
Order By: Relevance
“…1.2 Differences from the Proceedings Version [23] In the proceedings version [23], we only used Yamada's IBE scheme [17] to instantiate the IBEET scheme from the proposed construction. However, there is a more efficient IBE † † In this paper, we do not follow Lee et al's argument [2] in a security proof but follow Asano et al's one [22] which is an attribute-based extension of Lee et al's work with a refined proof. Gaussian Distributions.…”
Section: Our Contributionmentioning
confidence: 97%
See 1 more Smart Citation
“…1.2 Differences from the Proceedings Version [23] In the proceedings version [23], we only used Yamada's IBE scheme [17] to instantiate the IBEET scheme from the proposed construction. However, there is a more efficient IBE † † In this paper, we do not follow Lee et al's argument [2] in a security proof but follow Asano et al's one [22] which is an attribute-based extension of Lee et al's work with a refined proof. Gaussian Distributions.…”
Section: Our Contributionmentioning
confidence: 97%
“…† To the best of our knowledge, there are no IBEET schemes that satisfy the condition (3) unconditionally. Thus, PPT adversaries A appears in the formal condition of (3) by following [22]. The adversary A wins in the above game if M = M * and the advantage is defined to…”
Section: Security Let Ct *mentioning
confidence: 99%
“…The notion of equality test (ET) is not limited to PKE and IBE; it has also been studied in the context of certificateless PKE [23], group PKE [24], signcryption [25], attributebased encryption [26][27][28][29][30], and so on. Similarly, there are several more flexible notions of ET such as all-or-nothing ET [9], fine-grained ET [31,32], delegated ET [33], and so on.…”
Section: Related Workmentioning
confidence: 99%