Lattice-based public key encryption with equality test supporting flexible authorization in standard model

05/09/2020
by   Dung Hoang Duong, et al.
0

Public key encryption with equality test (PKEET) supports to check whether two ciphertexts encrypted under different public keys contain the same message or not. PKEET has many interesting applications such as keyword search on encrypted data, encrypted data partitioning for efficient encrypted data management, personal health record systems, spam filtering in encrypted email systems and so on. However, the PKEET scheme lacks an authorization mechanism for a user to control the comparison of its ciphertexts with others. In 2015, Ma et al. introduce the notion of PKEET with flexible authorization (PKEET-FA) which strengthens privacy protection. Since 2015, there are several follow-up works on PKEET-FA. But, all are secure in the random-oracle model. Moreover, all are vulnerable to quantum attacks. In this paper, we provide three constructions of quantum-safe PKEET-FA secure in the standard model. Proposed constructions are secure based on the hardness assumptions of integer lattices and ideal lattices. Finally, we implement the PKEET-FA scheme over ideal lattices.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
10/26/2020

Lattice-based IBE with Equality Test Supporting Flexible Authorization in the Standard Model

Identity-based encryption with equality test supporting flexible authori...
research
05/07/2020

Lattice-based public key encryption with equality test in standard model, revisited

Public key encryption with equality test (PKEET) allows testing whether ...
research
12/31/2020

Lattice-based Signcryption with Equality Test in Standard Model

A signcryption, which is an integration of a public key encryption and a...
research
08/29/2019

Key-Aggregate Searchable Encryption, Revisited: Formal Foundations for Cloud Applications, and Their Implementation

In the use of a cloud storage, sharing of data with efficient access con...
research
01/29/2019

Secure selections on encrypted multi-writer streams

Performing searches over encrypted data is a very current and active are...
research
11/16/2020

Collusion-Resistant Identity-based Proxy Re-Encryption: Lattice-based Constructions in Standard Model

The concept of proxy re-encryption (PRE) dates back to the work of Blaze...
research
05/28/2020

Mitigating TLS compromise with ECDHE and SRP

The paper reviews an implementation of an additional encrypted tunnel wi...

Please sign up or login with your details

Forgot password? Click here to reset