2020
DOI: 10.1016/j.ins.2019.09.025
|View full text |Cite
|
Sign up to set email alerts
|

Group public key encryption with equality test against offline message recovery attack

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
21
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
7
1

Relationship

1
7

Authors

Journals

citations
Cited by 30 publications
(21 citation statements)
references
References 12 publications
0
21
0
Order By: Relevance
“…The second to sixth columns reveal the computational efficiency for the algorithms of encryption, decryption, authorization, testing, and tracing. Compared to [7,16,17,35], the proposed T-GIBEwET scheme is more efficient than [7,16,17] in the decryption algorithm and more efficient than [17] in the authorization algorithm. Both authorization and tracking are supported in this paper.…”
Section: Performance Comparisonmentioning
confidence: 99%
See 1 more Smart Citation
“…The second to sixth columns reveal the computational efficiency for the algorithms of encryption, decryption, authorization, testing, and tracing. Compared to [7,16,17,35], the proposed T-GIBEwET scheme is more efficient than [7,16,17] in the decryption algorithm and more efficient than [17] in the authorization algorithm. Both authorization and tracking are supported in this paper.…”
Section: Performance Comparisonmentioning
confidence: 99%
“…In the same year, Lee et al proposed a new PKEwET scheme, from generic assumptions in the random oracle model [34]. To reduce the cost of computing and communication, Ling et al introduced the group mechanism into a PKEwET algorithm [35].…”
Section: Related Workmentioning
confidence: 99%
“…As both server could not check ciphertext and trapdoor independently, this construction could resist IKGA. On the other side, various works have been proposed to overcome OMRA [10], [31], [32]. Similar with [29], [30], Tang and Ling improved PKEET with supporting of finegrained authorization [15] and flexible authorization [33] respectively, whose dual-server construction could also resist OMRA.…”
Section: A Related Workmentioning
confidence: 99%
“…Tokens are generated by private key holders, and proxy can correctly perform equality test on ciphertext pairs only after obtaining corresponding tokens. is concept has been applied in a series of subsequent related works [4][5][6][7].…”
Section: Introductionmentioning
confidence: 99%
“…However, current PKEET definitions are not suitable for group granularity authorization in terms of efficiency [8]. Group public key encryption with equality test (G-PKEET) scheme is firstly proposed by Ling et al [7], which is the first PKEET scheme supporting group granularity authorization. Besides the concepts of "proxy" and "token," a trustable "group administrator" role is additionally introduced in G-PKEET, in charge of issuing tokens.…”
Section: Introductionmentioning
confidence: 99%