2019
DOI: 10.1007/978-3-030-21548-4_8
|View full text |Cite
|
Sign up to set email alerts
|

A Lattice-Based Public Key Encryption with Equality Test in Standard Model

Abstract: Public key encryption with equality test (PKEET) allows testing whether two ciphertexts are generated by the same message or not. PKEET is a potential candidate for many practical applications like efficient data management on encrypted databases. Potential applicability of PKEET leads to intensive research from its first instantiation by Yang et al. (CT-RSA 2010). Most of the followup constructions are secure in the random oracle model. Moreover, the security of all the concrete constructions is based on numb… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
16
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
4
3
1

Relationship

2
6

Authors

Journals

citations
Cited by 23 publications
(16 citation statements)
references
References 21 publications
0
16
0
Order By: Relevance
“…Later, Wang et al combined signcryption and an equality test [18]. Recently, Duong et al presented new lattice-based PKEwET schemes [19].…”
Section: Related Workmentioning
confidence: 99%
“…Later, Wang et al combined signcryption and an equality test [18]. Recently, Duong et al presented new lattice-based PKEwET schemes [19].…”
Section: Related Workmentioning
confidence: 99%
“…[5,7,11]. Moreover, public key encryption with equality test [12][13][14][15] can also be used to attain this goal. However, in these solutions, there is not any authorization mechanism and the data owner online is required to authorize the data user.…”
Section: Related Workmentioning
confidence: 99%
“…Among such tools, equality test (ET) allows service providers to check whether or not different ciphertexts are generated on the same message even though service providers do not know what the message actually is. This augmented property has been realized in various public key encryption schemes (which are called PKEET), e.g., [2], [3], [4], [5], [6] with applications to internet-based personal health record systems [7], secure outsourced database managements [2] just to name a few. Of course, the equality test mechanism can also be realized in signcryptions which we call signcryption with equality test (SCET).…”
Section: Introductionmentioning
confidence: 99%
“…Our scheme is basically inspired from the work of Sato and Shikata [17] and the recent method of Duong et al [5] for equality test. We have shown above that [17] does not work correctly.…”
Section: Introductionmentioning
confidence: 99%