CCA Secure encryption supporting authorized equality test on ciphertexts in standard model and its applications
We present an encryption scheme for authorized equality test on ciphertexts (SEET), which allows the data owner to authorize a tester to compare her ciphertexts without decrypting their values. The security of SEET is formally proved against three types of adversary, two of them for ciphertext confi...
Saved in:
Main Authors: | , , , |
---|---|
Format: | text |
Language: | English |
Published: |
Institutional Knowledge at Singapore Management University
2017
|
Subjects: | |
Online Access: | https://ink.library.smu.edu.sg/sis_research/3682 https://ink.library.smu.edu.sg/context/sis_research/article/4684/viewcontent/1_s20_S002002551730227X_main.pdf |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Singapore Management University |
Language: | English |
id |
sg-smu-ink.sis_research-4684 |
---|---|
record_format |
dspace |
spelling |
sg-smu-ink.sis_research-46842019-06-04T02:17:36Z CCA Secure encryption supporting authorized equality test on ciphertexts in standard model and its applications WANG, Yujue PANG, Hwee Hwa TRAN, Ngoc Hieu DENG, Robert H. We present an encryption scheme for authorized equality test on ciphertexts (SEET), which allows the data owner to authorize a tester to compare her ciphertexts without decrypting their values. The security of SEET is formally proved against three types of adversary, two of them for ciphertext confidentiality in the phases before and after authorization respectively, and the third for token privacy. To the best of our knowledge, our SEET construction is the first encryption scheme supporting equality test on ciphertexts that is proven secure against the three types of adversary in the standard model. Our SEET construction outperforms existing schemes in terms of ciphertext size and encryption/decryption/testing costs. To show its application in set operations, we extend it into schemes for controlled set distance computation, such that a curious server is able to deduce the similarity/dissimilarity score between two encrypted user sets without knowing their elements. 2017-06-01T07:00:00Z text application/pdf https://ink.library.smu.edu.sg/sis_research/3682 info:doi/10.1016/j.ins.2017.06.008 https://ink.library.smu.edu.sg/context/sis_research/article/4684/viewcontent/1_s20_S002002551730227X_main.pdf http://creativecommons.org/licenses/by-nc-nd/4.0/ Research Collection School Of Computing and Information Systems eng Institutional Knowledge at Singapore Management University Data encryption Equality test on ciphertexts Data outsourcing Private set intersection Set operation Implicit authentication Information Security |
institution |
Singapore Management University |
building |
SMU Libraries |
continent |
Asia |
country |
Singapore Singapore |
content_provider |
SMU Libraries |
collection |
InK@SMU |
language |
English |
topic |
Data encryption Equality test on ciphertexts Data outsourcing Private set intersection Set operation Implicit authentication Information Security |
spellingShingle |
Data encryption Equality test on ciphertexts Data outsourcing Private set intersection Set operation Implicit authentication Information Security WANG, Yujue PANG, Hwee Hwa TRAN, Ngoc Hieu DENG, Robert H. CCA Secure encryption supporting authorized equality test on ciphertexts in standard model and its applications |
description |
We present an encryption scheme for authorized equality test on ciphertexts (SEET), which allows the data owner to authorize a tester to compare her ciphertexts without decrypting their values. The security of SEET is formally proved against three types of adversary, two of them for ciphertext confidentiality in the phases before and after authorization respectively, and the third for token privacy. To the best of our knowledge, our SEET construction is the first encryption scheme supporting equality test on ciphertexts that is proven secure against the three types of adversary in the standard model. Our SEET construction outperforms existing schemes in terms of ciphertext size and encryption/decryption/testing costs. To show its application in set operations, we extend it into schemes for controlled set distance computation, such that a curious server is able to deduce the similarity/dissimilarity score between two encrypted user sets without knowing their elements. |
format |
text |
author |
WANG, Yujue PANG, Hwee Hwa TRAN, Ngoc Hieu DENG, Robert H. |
author_facet |
WANG, Yujue PANG, Hwee Hwa TRAN, Ngoc Hieu DENG, Robert H. |
author_sort |
WANG, Yujue |
title |
CCA Secure encryption supporting authorized equality test on ciphertexts in standard model and its applications |
title_short |
CCA Secure encryption supporting authorized equality test on ciphertexts in standard model and its applications |
title_full |
CCA Secure encryption supporting authorized equality test on ciphertexts in standard model and its applications |
title_fullStr |
CCA Secure encryption supporting authorized equality test on ciphertexts in standard model and its applications |
title_full_unstemmed |
CCA Secure encryption supporting authorized equality test on ciphertexts in standard model and its applications |
title_sort |
cca secure encryption supporting authorized equality test on ciphertexts in standard model and its applications |
publisher |
Institutional Knowledge at Singapore Management University |
publishDate |
2017 |
url |
https://ink.library.smu.edu.sg/sis_research/3682 https://ink.library.smu.edu.sg/context/sis_research/article/4684/viewcontent/1_s20_S002002551730227X_main.pdf |
_version_ |
1770573639535558656 |