CCA2 Attack and Modification of Huang et al .’s Public Key Encryption with Authorized Equality Test

In this article, we identify a flaw in Huang et al.'s public key encryption with authorized equality test (The Computer Journal, 2015). More precisely, we point out that the proof of the indistinguishability under adaptive chosen ciphertext attack (IND-CCA2) security for their scheme has a seri...

全面介紹

Saved in:
書目詳細資料
Main Authors: Lee, Hyung Tae, Ling, San, Seo, Jae Hong, Wang, Huaxiong
其他作者: School of Physical and Mathematical Sciences
格式: Article
語言:English
出版: 2017
主題:
在線閱讀:https://hdl.handle.net/10356/85122
http://hdl.handle.net/10220/43665
標簽: 添加標簽
沒有標簽, 成為第一個標記此記錄!
實物特徵
總結:In this article, we identify a flaw in Huang et al.'s public key encryption with authorized equality test (The Computer Journal, 2015). More precisely, we point out that the proof of the indistinguishability under adaptive chosen ciphertext attack (IND-CCA2) security for their scheme has a serious flaw. We illustrate this flaw by presenting a polynomial time CCA2 attack on their scheme. We also provide a solution to correct this flaw by modifying their scheme slightly. Our solution is quite efficient because it provides security against CCA2 attack by exploiting only the hash computation of a two times longer input without any increase in the sizes of ciphertexts and warrants.