2020
DOI: 10.1093/comjnl/bxaa120
|View full text |Cite
|
Sign up to set email alerts
|

Efficient Group ID-Based Encryption With Equality Test Against Insider Attack

Abstract: ID-based encryption with equality test (IBEET) allows a tester to compare ciphertexts encrypted under different public keys for checking whether they contain the same message. In this paper, we first introduce group mechanism into IBEET and propose a new primitive, namely group ID-based encryption with equality test (G-IBEET). With the group mechanism: (1) group administrator can authorize a tester to make comparison between ciphertexts of group users, but it cannot compare their ciphertexts with any ciphertex… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
5
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 14 publications
(5 citation statements)
references
References 22 publications
0
5
0
Order By: Relevance
“…Alornyo et al [25] constructed an IBEET from witness-based encryption technology to resist insider attacks, which offered weak indistinguishability under chosen ciphertext attacks in the random oracle model. Ling et al [26] introduced group IBEET, where only the group administrator was able to issue authorization tokens to the tester. Compared with our DS-IBE-AET construction in the dual-server model, these schemes engage only a single cloud server, which cannot resist offline keyword guessing attacks.…”
Section: Related Workmentioning
confidence: 99%
“…Alornyo et al [25] constructed an IBEET from witness-based encryption technology to resist insider attacks, which offered weak indistinguishability under chosen ciphertext attacks in the random oracle model. Ling et al [26] introduced group IBEET, where only the group administrator was able to issue authorization tokens to the tester. Compared with our DS-IBE-AET construction in the dual-server model, these schemes engage only a single cloud server, which cannot resist offline keyword guessing attacks.…”
Section: Related Workmentioning
confidence: 99%
“…To enable equality test on outsourced ciphertexts, many public key encryption schemes [6][7][8] and identity-based encryption schemes [9][10][11][12] have been proposed in the single server model. After the cloud server received the authorization from the user, it is able to perform the equality test on outsourced ciphertexts or some related operations such as encrypted data classification [13,14] based on the equality test, without decryption.…”
Section: Introductionmentioning
confidence: 99%
“…In common PKEET scheme, proxy has to request authorization from a user for executing equality test on ciphertexts encrypted by the user's public key. is authorization mode is referred to in [8] as "user granularity authorization. "…”
Section: Introductionmentioning
confidence: 99%
“…To cope with different application scenarios, the concept "group granularity authorization" has been put forward [8,9]. Under this authorization mode, a normal user can generate group ciphertexts with the permission of group administrator.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation