CCA2 Attack and Modification of Huang et al .’s Public Key Encryption with Authorized Equality Test
In this article, we identify a flaw in Huang et al.'s public key encryption with authorized equality test (The Computer Journal, 2015). More precisely, we point out that the proof of the indistinguishability under adaptive chosen ciphertext attack (IND-CCA2) security for their scheme has a seri...
Saved in:
Main Authors: | Lee, Hyung Tae, Ling, San, Seo, Jae Hong, Wang, Huaxiong |
---|---|
Other Authors: | School of Physical and Mathematical Sciences |
Format: | Article |
Language: | English |
Published: |
2017
|
Subjects: | |
Online Access: | https://hdl.handle.net/10356/85122 http://hdl.handle.net/10220/43665 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Nanyang Technological University |
Language: | English |
Similar Items
-
Public key encryption with equality test from generic assumptions in the random oracle model
by: Lee, Hyung Tae, et al.
Published: (2020) -
Semi-generic construction of public key encryption and identity-based encryption with equality test
by: Lee, Hyung Tae, et al.
Published: (2017) -
Efficient public key encryption with equality test in the standard model
by: Zhang, Kai, et al.
Published: (2020) -
Authorized Keyword Search on Encrypted Data
by: SHI, Jie, et al.
Published: (2014) -
Analysis of Gong et al.'s CCA2-secure homomorphic encryption
by: Lee, Hyung Tae, et al.
Published: (2017)