4.6 Article

An Identity-Based Encryption with Equality Test scheme for healthcare social apps

相关参考文献

注意:仅列出部分参考文献,下载原文获取全部文献信息。
Article Computer Science, Information Systems

Secure Replication-Based Outsourced Computation Using Smart Contracts

Willy Susilo et al.

Summary: The paper discusses the combination of replication-based outsourced computation (RBOC) mechanism and smart contracts. It proposes the use of public-key encryption with equality test (PKEET) to prevent lazy contractors from cheating in a decentralized blockchain network. To enhance security, the paper introduces the notion of PKEET against lazy encryptors (PKEET-LE) and presents a concrete construction of PKEET-LE.

IEEE TRANSACTIONS ON SERVICES COMPUTING (2023)

Article Computer Science, Information Systems

Group public key encryption supporting equality test without bilinear pairings

Xiaoying Shen et al.

Summary: In this paper, we propose an efficient and verifiable group public key encryption scheme with equality test, GPKEET/BP, that does not require bilinear pairings. Experimental results show that the test algorithm of our scheme is about 92% faster than the existing scheme by Ling et al., making our GPKEET/BP scheme better suited for group ciphertext equality test situations.

INFORMATION SCIENCES (2022)

Article Computer Science, Information Systems

PKE-MET: Public-Key Encryption With Multi-Ciphertext Equality Test in Cloud Computing

Willy Susilo et al.

Summary: Cloud computing removes the need for local hardware architecture and reduces the computation costs for users. To protect privacy, data is encrypted before being sent to the cloud server. However, there are challenges in performing equality tests among multiple ciphertexts in cloud computing, such as information disclosure and redundant computation cost. This article proposes a novel public-key encryption scheme and extends it to the concept of flexible multi-ciphertext equality testing to improve efficiency and security in cloud computing.

IEEE TRANSACTIONS ON CLOUD COMPUTING (2022)

Article Computer Science, Hardware & Architecture

Efficient Group ID-Based Encryption With Equality Test Against Insider Attack

Yunhao Ling et al.

Summary: This paper introduces a new primitive called group ID-based encryption with equality test (G-IBEET), which allows comparing ciphertexts of group users and can resist insider attacks from authorized testers. By issuing group trapdoors and implementing group granularity authorization, the computation and storage costs of trapdoors in traditional IBEET schemes are greatly reduced. The security analysis of G-IBEET is conducted in the random oracle model to ensure its effectiveness.

COMPUTER JOURNAL (2021)

Article Computer Science, Theory & Methods

Private Set Intersection With Authorization Over Outsourced Encrypted Datasets

Yuanhao Wang et al.

Summary: Cloud computing brings convenience and cost savings, but security and privacy issues cannot be ignored. Private set intersection is important in many cloud computing applications, but existing protocols have limitations.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2021)

Article Computer Science, Information Systems

Group public key encryption with equality test against offline message recovery attack

Yunhao Ling et al.

INFORMATION SCIENCES (2020)

Article Computer Science, Theory & Methods

Efficient public key encryption with equality test in the standard model

Kai Zhang et al.

THEORETICAL COMPUTER SCIENCE (2019)

Article Computer Science, Information Systems

A pairing-based cryptographic approach for data security in the cloud

Miguel Morales-Sandoval et al.

INTERNATIONAL JOURNAL OF INFORMATION SECURITY (2018)

Article Computer Science, Information Systems

Certificateless public key encryption with equality test

Haipeng Qu et al.

INFORMATION SCIENCES (2018)

Article Computer Science, Theory & Methods

Efficient and secure identity-based encryption scheme with equality test in cloud computing

Libing Wu et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2017)

Article Computer Science, Information Systems

Identity-based encryption with outsourced equality test in cloud computing

Sha Ma

INFORMATION SCIENCES (2016)

Article Computer Science, Theory & Methods

Efficient Public Key Encryption With Equality Test Supporting Flexible Authorization

Sha Ma et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2015)