2019
DOI: 10.1109/access.2019.2940646
|View full text |Cite
|
Sign up to set email alerts
|

Public Key Authenticated Encryption With Designated Equality Test and its Applications in Diagnostic Related Groups

Abstract: Due to the massive growth of data and security concerns, data of patients would be encrypted and outsourced to the cloud server for feature matching in various medical scenarios, such as personal health record systems, actuarial judgments and diagnostic related groups. Public key encryption with equality test (PKEET) is a useful utility for encrypted feature matching. Authorized tester could perform data matching on encrypted data without decrypting. Unfortunately, due to the limited terminology in medicine, p… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
5
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
7
1

Relationship

2
6

Authors

Journals

citations
Cited by 11 publications
(5 citation statements)
references
References 31 publications
0
5
0
Order By: Relevance
“…Aside from secure searchable solutions for IIoT, effective access control on the outsourced data is also important. Inconsequent to this, Wang et al 25 proposed a public‐key authenticated encryption with designated equality test which could resist attacks launched by an inside adversary such as the offline message recovery attack. In their scheme, the sender specifies the authorized user to the ciphertexts while encrypting a message to prevent outside adversaries from testing.…”
Section: Related Workmentioning
confidence: 99%
“…Aside from secure searchable solutions for IIoT, effective access control on the outsourced data is also important. Inconsequent to this, Wang et al 25 proposed a public‐key authenticated encryption with designated equality test which could resist attacks launched by an inside adversary such as the offline message recovery attack. In their scheme, the sender specifies the authorized user to the ciphertexts while encrypting a message to prevent outside adversaries from testing.…”
Section: Related Workmentioning
confidence: 99%
“…To make the authorization more flexible, Ma et al [7] proposed a flexible PKEET scheme, which supports four types of authorization. Subsequently, a variety of enhanced schemes [12]- [14] have been proposed to improve security. Zhang et al [12] proposed an efficient PKEET scheme under a specific cryptographic assumption in the standard model.…”
Section: A Related Workmentioning
confidence: 99%
“…As both server could not check ciphertext and trapdoor independently, this construction could resist IKGA. On the other side, various works have been proposed to overcome OMRA [10], [31], [32]. Similar with [29], [30], Tang and Ling improved PKEET with supporting of finegrained authorization [15] and flexible authorization [33] respectively, whose dual-server construction could also resist OMRA.…”
Section: A Related Workmentioning
confidence: 99%
“…Therefore we should first encrypt the data then store it in untrusted cloud servers. When searching encrypted data, a typical way is public-key encryption with keyword search (PEKS) [2]- [10]. PEKS provides a primitive that using a trapdoor from keyword and secret key to search ciphertexts.…”
Section: Introductionmentioning
confidence: 99%