Loading...
|
Please use this identifier to cite or link to this item:
https://nccur.lib.nccu.edu.tw/handle/140.119/111953
|
Title: | Semantic secure public key encryption with filtered equality test PKE-FET |
Authors: | 左瑞麟 Huang, Kaibin Chen, Yuchi Tso, Raylin |
Contributors: | 資訊科學系 |
Keywords: | Data privacy;Digital storage;Public key cryptography;Security of data;Semantics;Testing;Cloud storages;Equality tests;Public-key encryption;Secret sharing;Semantic security;Cryptography |
Date: | 2015-07 |
Issue Date: | 2017-08-14 16:07:19 (UTC+8) |
Abstract: | Cloud storage allows users to outsource their data to a storage server. For general security and privacy concerns, users prefer storing encrypted data to pure ones so that servers do not learn anything about privacy. However, there is a natural issue that servers have worked some analyses (i.e. statistics) or routines for encrypted data without losing privacy. In this paper, we address the basic functionality, equality test, over encrypted data, which at least can be applied to specific analyses like private information retrieval. We introduce a new system, called filtered equality test, which is an additional functionality for existing public key encryption schemes. It satisfies the following scenario: a ciphertext-receiver selects several messages as a set and produces its related warrant; then, on receiving this warrant, an user is able to perform equality test on the receiver`s ciphertext without decryption when the hidden message belongs to that message set. Similar to the attribute based encryption, ABE. In ABE schemes, those ones who match the settled conditions could get the privilege of decryption. In FET schemes, those `messages inside selected set` can be equality tested. Combining PKE schemes and filtered equality test, we propose a framework of public key encryption scheme with filtered equality test, abbreviated as PKE-FET. Then, taking ElGamal for example, we propose a concrete PKE-FET scheme based on secret sharing and bilinear map. Finally, we prove our proposition with semantic security in the standard model. © Copyright 2015 SCITEPRESS - Science and Technology Publications. All rights reserved. |
Relation: | SECRYPT 2015 - 12th International Conference on Security and Cryptography, Proceedings; Part of 12th International Joint Conference on e-Business and Telecommunications, ICETE 2015, (), 327-334 12th International Conference on Security and Cryptography, SECRYPT 2015; Colmar, Alsace; France; 20 July 2015 到 22 July 2015; 代碼 113533 |
Data Type: | conference |
Appears in Collections: | [資訊科學系] 會議論文
|
Files in This Item:
File |
Description |
Size | Format | |
index.html | | 0Kb | HTML2 | 566 | View/Open |
|
All items in 政大典藏 are protected by copyright, with all rights reserved.
|