CCA2 Attack and Modification of Huang et al .’s Public Key Encryption with Authorized Equality Test

In this article, we identify a flaw in Huang et al.'s public key encryption with authorized equality test (The Computer Journal, 2015). More precisely, we point out that the proof of the indistinguishability under adaptive chosen ciphertext attack (IND-CCA2) security for their scheme has a seri...

Full description

Saved in:
Bibliographic Details
Main Authors: Lee, Hyung Tae, Ling, San, Seo, Jae Hong, Wang, Huaxiong
Other Authors: School of Physical and Mathematical Sciences
Format: Article
Language:English
Published: 2017
Subjects:
Online Access:https://hdl.handle.net/10356/85122
http://hdl.handle.net/10220/43665
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Nanyang Technological University
Language: English
id sg-ntu-dr.10356-85122
record_format dspace
spelling sg-ntu-dr.10356-851222023-02-28T19:22:28Z CCA2 Attack and Modification of Huang et al .’s Public Key Encryption with Authorized Equality Test Lee, Hyung Tae Ling, San Seo, Jae Hong Wang, Huaxiong School of Physical and Mathematical Sciences Public Key Encryption Authorized Equality Test In this article, we identify a flaw in Huang et al.'s public key encryption with authorized equality test (The Computer Journal, 2015). More precisely, we point out that the proof of the indistinguishability under adaptive chosen ciphertext attack (IND-CCA2) security for their scheme has a serious flaw. We illustrate this flaw by presenting a polynomial time CCA2 attack on their scheme. We also provide a solution to correct this flaw by modifying their scheme slightly. Our solution is quite efficient because it provides security against CCA2 attack by exploiting only the hash computation of a two times longer input without any increase in the sizes of ciphertexts and warrants. MOE (Min. of Education, S’pore) Accepted version 2017-08-31T04:17:23Z 2019-12-06T15:57:31Z 2017-08-31T04:17:23Z 2019-12-06T15:57:31Z 2016 Journal Article Lee, H. T., Ling, S., Seo, J. H., & Wang, H. (2016). CCA2 Attack and Modification of Huang et al.'s Public Key Encryption with Authorized Equality Test. The Computer Journal, 59(11), 1689-1694. 0010-4620 https://hdl.handle.net/10356/85122 http://hdl.handle.net/10220/43665 10.1093/comjnl/bxw033 en The Computer Journal © 2016 British Computer Society. This is the author created version of a work that has been peer reviewed and accepted for publication in The Computer Journal, published by Oxford University Press OUP on behalf of British Computer Society. It incorporates referee’s comments but changes resulting from the publishing process, such as copyediting, structural formatting, may not be reflected in this document.  The published version is available at: [http://dx.doi.org/10.1093/comjnl/bxw033]. 6 p. application/pdf
institution Nanyang Technological University
building NTU Library
continent Asia
country Singapore
Singapore
content_provider NTU Library
collection DR-NTU
language English
topic Public Key Encryption
Authorized Equality Test
spellingShingle Public Key Encryption
Authorized Equality Test
Lee, Hyung Tae
Ling, San
Seo, Jae Hong
Wang, Huaxiong
CCA2 Attack and Modification of Huang et al .’s Public Key Encryption with Authorized Equality Test
description In this article, we identify a flaw in Huang et al.'s public key encryption with authorized equality test (The Computer Journal, 2015). More precisely, we point out that the proof of the indistinguishability under adaptive chosen ciphertext attack (IND-CCA2) security for their scheme has a serious flaw. We illustrate this flaw by presenting a polynomial time CCA2 attack on their scheme. We also provide a solution to correct this flaw by modifying their scheme slightly. Our solution is quite efficient because it provides security against CCA2 attack by exploiting only the hash computation of a two times longer input without any increase in the sizes of ciphertexts and warrants.
author2 School of Physical and Mathematical Sciences
author_facet School of Physical and Mathematical Sciences
Lee, Hyung Tae
Ling, San
Seo, Jae Hong
Wang, Huaxiong
format Article
author Lee, Hyung Tae
Ling, San
Seo, Jae Hong
Wang, Huaxiong
author_sort Lee, Hyung Tae
title CCA2 Attack and Modification of Huang et al .’s Public Key Encryption with Authorized Equality Test
title_short CCA2 Attack and Modification of Huang et al .’s Public Key Encryption with Authorized Equality Test
title_full CCA2 Attack and Modification of Huang et al .’s Public Key Encryption with Authorized Equality Test
title_fullStr CCA2 Attack and Modification of Huang et al .’s Public Key Encryption with Authorized Equality Test
title_full_unstemmed CCA2 Attack and Modification of Huang et al .’s Public Key Encryption with Authorized Equality Test
title_sort cca2 attack and modification of huang et al .’s public key encryption with authorized equality test
publishDate 2017
url https://hdl.handle.net/10356/85122
http://hdl.handle.net/10220/43665
_version_ 1759858328519835648