2019
DOI: 10.1007/978-3-030-21548-4_3
|View full text |Cite
|
Sign up to set email alerts
|

Group ID-Based Encryption with Equality Test

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
10
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
8
1

Relationship

2
7

Authors

Journals

citations
Cited by 18 publications
(10 citation statements)
references
References 23 publications
0
10
0
Order By: Relevance
“…In addition, their strategy featured a key-isolating technique to reduce the likelihood of key exposure. Paper [20] have recently developed a broad strategy for achieving security in the SM for PKEET that may also be applied to the IBEET scheme.…”
Section: Literature Reviewmentioning
confidence: 99%
“…In addition, their strategy featured a key-isolating technique to reduce the likelihood of key exposure. Paper [20] have recently developed a broad strategy for achieving security in the SM for PKEET that may also be applied to the IBEET scheme.…”
Section: Literature Reviewmentioning
confidence: 99%
“…As both server could not check ciphertext and trapdoor independently, this construction could resist IKGA. On the other side, various works have been proposed to overcome OMRA [10], [31], [32]. Similar with [29], [30], Tang and Ling improved PKEET with supporting of finegrained authorization [15] and flexible authorization [33] respectively, whose dual-server construction could also resist OMRA.…”
Section: A Related Workmentioning
confidence: 99%
“…It assumes that the servers do not collude and requires additional communication between the servers. Relatively, [27], [28] proposed to share a secret among group members only with which can a member generate a valid ciphertext legally. It is more efficient than the aforementioned dual-server schemes.…”
Section: B Related Work 1) Pkeetmentioning
confidence: 99%
“…It is worth noting that the schemes with group mechanism, e.g. G-IBEET [28], need to create a group for each comparison and set up group administrator, which reduces the operability of the scheme. Although G-IBEET scheme seems to be more computationally efficient, users need to encrypt the data multiple times for comparing with different users, which is inconvenient in practice.…”
Section: Proof Of Lemmamentioning
confidence: 99%