CCA2 Attack and Modification of Huang et al .’s Public Key Encryption with Authorized Equality Test
In this article, we identify a flaw in Huang et al.'s public key encryption with authorized equality test (The Computer Journal, 2015). More precisely, we point out that the proof of the indistinguishability under adaptive chosen ciphertext attack (IND-CCA2) security for their scheme has a seri...
Saved in:
Main Authors: | , , , |
---|---|
Other Authors: | |
Format: | Article |
Language: | English |
Published: |
2017
|
Subjects: | |
Online Access: | https://hdl.handle.net/10356/85122 http://hdl.handle.net/10220/43665 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Nanyang Technological University |
Language: | English |
id |
sg-ntu-dr.10356-85122 |
---|---|
record_format |
dspace |
spelling |
sg-ntu-dr.10356-851222023-02-28T19:22:28Z CCA2 Attack and Modification of Huang et al .’s Public Key Encryption with Authorized Equality Test Lee, Hyung Tae Ling, San Seo, Jae Hong Wang, Huaxiong School of Physical and Mathematical Sciences Public Key Encryption Authorized Equality Test In this article, we identify a flaw in Huang et al.'s public key encryption with authorized equality test (The Computer Journal, 2015). More precisely, we point out that the proof of the indistinguishability under adaptive chosen ciphertext attack (IND-CCA2) security for their scheme has a serious flaw. We illustrate this flaw by presenting a polynomial time CCA2 attack on their scheme. We also provide a solution to correct this flaw by modifying their scheme slightly. Our solution is quite efficient because it provides security against CCA2 attack by exploiting only the hash computation of a two times longer input without any increase in the sizes of ciphertexts and warrants. MOE (Min. of Education, S’pore) Accepted version 2017-08-31T04:17:23Z 2019-12-06T15:57:31Z 2017-08-31T04:17:23Z 2019-12-06T15:57:31Z 2016 Journal Article Lee, H. T., Ling, S., Seo, J. H., & Wang, H. (2016). CCA2 Attack and Modification of Huang et al.'s Public Key Encryption with Authorized Equality Test. The Computer Journal, 59(11), 1689-1694. 0010-4620 https://hdl.handle.net/10356/85122 http://hdl.handle.net/10220/43665 10.1093/comjnl/bxw033 en The Computer Journal © 2016 British Computer Society. This is the author created version of a work that has been peer reviewed and accepted for publication in The Computer Journal, published by Oxford University Press OUP on behalf of British Computer Society. It incorporates referee’s comments but changes resulting from the publishing process, such as copyediting, structural formatting, may not be reflected in this document. The published version is available at: [http://dx.doi.org/10.1093/comjnl/bxw033]. 6 p. application/pdf |
institution |
Nanyang Technological University |
building |
NTU Library |
continent |
Asia |
country |
Singapore Singapore |
content_provider |
NTU Library |
collection |
DR-NTU |
language |
English |
topic |
Public Key Encryption Authorized Equality Test |
spellingShingle |
Public Key Encryption Authorized Equality Test Lee, Hyung Tae Ling, San Seo, Jae Hong Wang, Huaxiong CCA2 Attack and Modification of Huang et al .’s Public Key Encryption with Authorized Equality Test |
description |
In this article, we identify a flaw in Huang et al.'s public key encryption with authorized equality test (The Computer Journal, 2015). More precisely, we point out that the proof of the indistinguishability under adaptive chosen ciphertext attack (IND-CCA2) security for their scheme has a serious flaw. We illustrate this flaw by presenting a polynomial time CCA2 attack on their scheme. We also provide a solution to correct this flaw by modifying their scheme slightly. Our solution is quite efficient because it provides security against CCA2 attack by exploiting only the hash computation of a two times longer input without any increase in the sizes of ciphertexts and warrants. |
author2 |
School of Physical and Mathematical Sciences |
author_facet |
School of Physical and Mathematical Sciences Lee, Hyung Tae Ling, San Seo, Jae Hong Wang, Huaxiong |
format |
Article |
author |
Lee, Hyung Tae Ling, San Seo, Jae Hong Wang, Huaxiong |
author_sort |
Lee, Hyung Tae |
title |
CCA2 Attack and Modification of Huang
et al
.’s Public Key Encryption with Authorized Equality Test |
title_short |
CCA2 Attack and Modification of Huang
et al
.’s Public Key Encryption with Authorized Equality Test |
title_full |
CCA2 Attack and Modification of Huang
et al
.’s Public Key Encryption with Authorized Equality Test |
title_fullStr |
CCA2 Attack and Modification of Huang
et al
.’s Public Key Encryption with Authorized Equality Test |
title_full_unstemmed |
CCA2 Attack and Modification of Huang
et al
.’s Public Key Encryption with Authorized Equality Test |
title_sort |
cca2 attack and modification of huang
et al
.’s public key encryption with authorized equality test |
publishDate |
2017 |
url |
https://hdl.handle.net/10356/85122 http://hdl.handle.net/10220/43665 |
_version_ |
1759858328519835648 |