Security Analysis and Modification of ID-Based Encryption with Equality Test from ACISP 2017

Author(s):  
Hyung Tae Lee ◽  
Huaxiong Wang ◽  
Kai Zhang
2020 ◽  
Author(s):  
Yunhao Ling ◽  
Sha Ma ◽  
Qiong Huang ◽  
Ximing Li ◽  
Yijian Zhong ◽  
...  

Abstract ID-based encryption with equality test (IBEET) allows a tester to compare ciphertexts encrypted under different public keys for checking whether they contain the same message. In this paper, we first introduce group mechanism into IBEET and propose a new primitive, namely group ID-based encryption with equality test (G-IBEET). With the group mechanism: (1) group administrator can authorize a tester to make comparison between ciphertexts of group users, but it cannot compare their ciphertexts with any ciphertext of any user who is not in the group. Such group granularity authorization can make IBEET that adapts to group scenario; (2) for the group granularity authorization, only one trapdoor, named group trapdoor, should be issued to the tester, which can greatly reduce the cost of computation, transmission and storage of trapdoors in traditional IBEET schemes; (3) G-IBEET can resist the insider attack launched by the authorized tester, which is an open problem in IBEET. We give definitions for G-IBEET and propose a concrete construction with an efficient test algorithm. We then give its security analysis in the random oracle model.


2021 ◽  
Vol 0 (0) ◽  
pp. 0
Author(s):  
Yu-Chi Chen

<p style='text-indent:20px;'>Public key encryption with equality test can provide a very simple add-on in which any one can directly perform testing over a pair of ciphertexts to check whether the underlying messages are identical or not without decryption. To restrict the such test power for different scenarios, that of delegated equality test is introduced to allow only the authenticated party to perform the test. In this paper, we focus on the security of public key encryption with filtered equality test (PKE-FET). The delegation to the party is only of a message set for designated testers in PKE-FET, which implies it cannot test any underlying message out of the set. We aim for investigating distinct security notions (static and adaptive security) with specific properties of the potential adversaries. Finally, we show the relationship between the security and complexity, and show the scheme of Huang et al. can reach adaptive security.</p>


Author(s):  
Yu.M. Sklyarova ◽  
I.Yu. Sklyarov ◽  
E.N. Lapina

2020 ◽  
Vol 10 (5) ◽  
pp. 43-49
Author(s):  
MARINA MARKHGEYM ◽  
◽  
ANNA BEZUGLAYA

The article presents the author’s analysis of constitutional texts, regulations and analytical materials of the countries of the Commonwealth of Independent States in order to consolidate in them the consolidated powers of the chambers of parliaments associated with the implementation of food security. Analysis of legal acts of the studied group of states showed that the sphere of food security (as part of the agrarian and food sphere/function) is one of the eventual spheres of interaction between the chambers of parliament. In the course of the study, two approaches of states to the formalization of provisions related to food security in constitutional texts were identified. The first approach is to consolidate norms that indirectly affect the field of food security (Belarus, Kazakhstan, Russia); the second - in the absence of such provisions (Tajikistan and Uzbekistan). It has been established that the interaction of the chambers of parliaments in the field of food security is implemented through the adoption of laws, as well as through various parliamentary events (parliamentary hearings, round tables, seminars, meetings, etc.). It is concluded that the available options for interaction between the chambers of parliaments of states in the field of food security reflect their independent approaches, which are developed on the basis of legal doctrine and practice.


2012 ◽  
Vol 3 (5) ◽  
pp. 82-84
Author(s):  
Reshna Wilson ◽  
◽  
Biju Balakrishnan

Author(s):  
Yukiyasu TSUNOO ◽  
Teruo SAITO ◽  
Maki SHIGERI ◽  
Takeshi KAWABATA

2010 ◽  
Vol 69 (7) ◽  
pp. 629-638
Author(s):  
J. Sisniega-Gonzalez ◽  
E. Aguirre-Anaya ◽  
Mariko Nakano-Miyatake ◽  
Hector Manuel Perez-Meana

1988 ◽  
Vol 1988 (2) ◽  
pp. 51-55, 69-70 ◽  
Author(s):  
H. Russell Fogler
Keyword(s):  

Sign in / Sign up

Export Citation Format

Share Document