CCA Secure encryption supporting authorized equality test on ciphertexts in standard model and its applications

We present an encryption scheme for authorized equality test on ciphertexts (SEET), which allows the data owner to authorize a tester to compare her ciphertexts without decrypting their values. The security of SEET is formally proved against three types of adversary, two of them for ciphertext confi...

Full description

Saved in:
Bibliographic Details
Main Authors: WANG, Yujue, PANG, Hwee Hwa, TRAN, Ngoc Hieu, DENG, Robert H.
Format: text
Language:English
Published: Institutional Knowledge at Singapore Management University 2017
Subjects:
Online Access:https://ink.library.smu.edu.sg/sis_research/3682
https://ink.library.smu.edu.sg/context/sis_research/article/4684/viewcontent/1_s20_S002002551730227X_main.pdf
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Singapore Management University
Language: English
id sg-smu-ink.sis_research-4684
record_format dspace
spelling sg-smu-ink.sis_research-46842019-06-04T02:17:36Z CCA Secure encryption supporting authorized equality test on ciphertexts in standard model and its applications WANG, Yujue PANG, Hwee Hwa TRAN, Ngoc Hieu DENG, Robert H. We present an encryption scheme for authorized equality test on ciphertexts (SEET), which allows the data owner to authorize a tester to compare her ciphertexts without decrypting their values. The security of SEET is formally proved against three types of adversary, two of them for ciphertext confidentiality in the phases before and after authorization respectively, and the third for token privacy. To the best of our knowledge, our SEET construction is the first encryption scheme supporting equality test on ciphertexts that is proven secure against the three types of adversary in the standard model. Our SEET construction outperforms existing schemes in terms of ciphertext size and encryption/decryption/testing costs. To show its application in set operations, we extend it into schemes for controlled set distance computation, such that a curious server is able to deduce the similarity/dissimilarity score between two encrypted user sets without knowing their elements. 2017-06-01T07:00:00Z text application/pdf https://ink.library.smu.edu.sg/sis_research/3682 info:doi/10.1016/j.ins.2017.06.008 https://ink.library.smu.edu.sg/context/sis_research/article/4684/viewcontent/1_s20_S002002551730227X_main.pdf http://creativecommons.org/licenses/by-nc-nd/4.0/ Research Collection School Of Computing and Information Systems eng Institutional Knowledge at Singapore Management University Data encryption Equality test on ciphertexts Data outsourcing Private set intersection Set operation Implicit authentication Information Security
institution Singapore Management University
building SMU Libraries
continent Asia
country Singapore
Singapore
content_provider SMU Libraries
collection InK@SMU
language English
topic Data encryption
Equality test on ciphertexts
Data outsourcing
Private set intersection
Set operation
Implicit authentication
Information Security
spellingShingle Data encryption
Equality test on ciphertexts
Data outsourcing
Private set intersection
Set operation
Implicit authentication
Information Security
WANG, Yujue
PANG, Hwee Hwa
TRAN, Ngoc Hieu
DENG, Robert H.
CCA Secure encryption supporting authorized equality test on ciphertexts in standard model and its applications
description We present an encryption scheme for authorized equality test on ciphertexts (SEET), which allows the data owner to authorize a tester to compare her ciphertexts without decrypting their values. The security of SEET is formally proved against three types of adversary, two of them for ciphertext confidentiality in the phases before and after authorization respectively, and the third for token privacy. To the best of our knowledge, our SEET construction is the first encryption scheme supporting equality test on ciphertexts that is proven secure against the three types of adversary in the standard model. Our SEET construction outperforms existing schemes in terms of ciphertext size and encryption/decryption/testing costs. To show its application in set operations, we extend it into schemes for controlled set distance computation, such that a curious server is able to deduce the similarity/dissimilarity score between two encrypted user sets without knowing their elements.
format text
author WANG, Yujue
PANG, Hwee Hwa
TRAN, Ngoc Hieu
DENG, Robert H.
author_facet WANG, Yujue
PANG, Hwee Hwa
TRAN, Ngoc Hieu
DENG, Robert H.
author_sort WANG, Yujue
title CCA Secure encryption supporting authorized equality test on ciphertexts in standard model and its applications
title_short CCA Secure encryption supporting authorized equality test on ciphertexts in standard model and its applications
title_full CCA Secure encryption supporting authorized equality test on ciphertexts in standard model and its applications
title_fullStr CCA Secure encryption supporting authorized equality test on ciphertexts in standard model and its applications
title_full_unstemmed CCA Secure encryption supporting authorized equality test on ciphertexts in standard model and its applications
title_sort cca secure encryption supporting authorized equality test on ciphertexts in standard model and its applications
publisher Institutional Knowledge at Singapore Management University
publishDate 2017
url https://ink.library.smu.edu.sg/sis_research/3682
https://ink.library.smu.edu.sg/context/sis_research/article/4684/viewcontent/1_s20_S002002551730227X_main.pdf
_version_ 1770573639535558656