4.6 Article

A lattice-based public key encryption scheme with delegated equality test

Related references

Note: Only part of the references are listed.
Article Computer Science, Theory & Methods

Lattice-based public-key encryption with equality test supporting flexible authorization in standard model

Partha Sarathi Roy et al.

Summary: As cloud computing continues to advance, storing data in cloud servers has become a popular outsourcing trend. However, this raises concerns about the security and privacy of cloud data. To address these concerns, new cryptographic primitives such as PKEET and PKEET-FA have been introduced. This paper presents two constructions of quantum-safe PKEET-FA in the standard model based on different assumptions.

THEORETICAL COMPUTER SCIENCE (2022)

Article Computer Science, Hardware & Architecture

Lattice-based signcryption with equality test in standard model

Huy Quoc Le et al.

Summary: Signcryption technology combines public key encryption and digital signatures to provide confidentiality and authenticity simultaneously. It also allows a third party to check if two ciphertexts come from the same message without knowing the content, which is crucial for computing on encrypted data. The proposed lattice-based signcryption scheme ensures security against insider attacks and highlights vulnerabilities in existing lattice-based signcryption methods.

COMPUTER STANDARDS & INTERFACES (2021)

Article Computer Science, Information Systems

Public key encryption with equality test in the standard model

Hyung Tae Lee et al.

INFORMATION SCIENCES (2020)

Article Computer Science, Information Systems

Certificateless public key encryption with equality test

Haipeng Qu et al.

INFORMATION SCIENCES (2018)

Article Computer Science, Theory & Methods

Efficient and secure identity-based encryption scheme with equality test in cloud computing

Libing Wu et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2017)

Article Computer Science, Information Systems

Verifiable Public Key Encryption Scheme With Equality Test in 5G Networks

Yan Xu et al.

IEEE ACCESS (2017)

Article Computer Science, Information Systems

Identity-based encryption with outsourced equality test in cloud computing

Sha Ma

INFORMATION SCIENCES (2016)

Article Computer Science, Hardware & Architecture

PKE-AET: Public Key Encryption with Authorized Equality Test

Kaibin Huang et al.

COMPUTER JOURNAL (2015)

Article Computer Science, Theory & Methods

Efficient Public Key Encryption With Equality Test Supporting Flexible Authorization

Sha Ma et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2015)

Article Computer Science, Hardware & Architecture

Public Key Encryption with Delegated Equality Test in a Multi-User Setting

Sha Ma et al.

COMPUTER JOURNAL (2015)

Article Computer Science, Information Systems

Public key encryption supporting plaintext equality test and user-specified authorization

Qiang Tang

SECURITY AND COMMUNICATION NETWORKS (2012)

Article Computer Science, Hardware & Architecture

A View of Cloud Computing

Michael Armbrust et al.

COMMUNICATIONS OF THE ACM (2010)

Article Computer Science, Information Systems

Data Security in the World of Cloud Computing

Lori M. Kaufman

IEEE SECURITY & PRIVACY (2009)

Article Computer Science, Hardware & Architecture

On Lattices, Learning with Errors, Random Linear Codes, and Cryptography

Oded Regev

JOURNAL OF THE ACM (2009)

Article Computer Science, Theory & Methods

Worst-case to average-case reductions based on Gaussian measures

Daniele Micciancio et al.

SIAM JOURNAL ON COMPUTING (2007)