2014
DOI: 10.1093/comjnl/bxu026
|View full text |Cite
|
Sign up to set email alerts
|

Public Key Encryption with Delegated Equality Test in a Multi-User Setting

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
38
0

Year Published

2017
2017
2021
2021

Publication Types

Select...
6
3

Relationship

0
9

Authors

Journals

citations
Cited by 92 publications
(38 citation statements)
references
References 0 publications
0
38
0
Order By: Relevance
“…An authorization mechanism is thus needed to control the access to the test function. Fine-grained authorization policy PKEET (FG-PKEET) was proposed to implement the accurate authorization in PKEET [14], in which only the authorized users can perform the equality test.Public key encryption with delegated equality test (PKE-DET) was proposed to optimize the authorization mechanism [11], in which only the delegated party can run the test. Furthermore, a PKEET scheme with flexible authorization was proposed in [10], which further refines the authorization into four types.…”
Section: Related Workmentioning
confidence: 99%
“…An authorization mechanism is thus needed to control the access to the test function. Fine-grained authorization policy PKEET (FG-PKEET) was proposed to implement the accurate authorization in PKEET [14], in which only the authorized users can perform the equality test.Public key encryption with delegated equality test (PKE-DET) was proposed to optimize the authorization mechanism [11], in which only the delegated party can run the test. Furthermore, a PKEET scheme with flexible authorization was proposed in [10], which further refines the authorization into four types.…”
Section: Related Workmentioning
confidence: 99%
“…Their work achieves the security against the One-way Chosen Ciphertext Attack (OW-CCA). There are some extensions of PKEET which offer the fine or flexible grain authorization and stronger security [13,12,6,9,10,8]. To achieve the stronger security, the authorization mechanism is adopted to these PKEET schemes.…”
Section: Related Workmentioning
confidence: 99%
“…As an instance, Ma et al in [9], proposed a PKEET with the flexible authorization according to four scenarios. In [10], Ma et al provided a solution to the PKEET in multi-user setting by delegating the equality test to a fully trusted proxy. Later, Ma [8] proposed an identity-based PKEET (IBEET).…”
Section: Related Workmentioning
confidence: 99%
“…This property is of use in various practical applications, such as keyword search on encrypted data, encrypted data partitioning for efficient encrypted data management, personal health record systems, spam filtering in encrypted email systems and so on. Due to its numerous practical applications, there have been intensive researches in this direction with the appearance of improved schemes or ones with additional functionalities [17,18,19,13,10]. However, they are all proven to be secure in the random oracle model which does not exist in reality.…”
Section: Introductionmentioning
confidence: 99%