Abstract
In this paper, we extend the work about public key encryption schemes supporting fine–grained authorisation (FG–PKEET), done by Tang (2011b). First of all, we correct some flaws in Tang (2011b) and discuss how to extend the proposed cryptosystem to support approximate equality test. Secondly, we present a comparison between FG–PKEET and other similar primitives including AoN–PKEET by Tang (2011a) and PKEET by Yang et al. (2010), and demonstrate their differences in complexity and achieved security. Thirdly, to mitigate the inherent offline message recovery attacks, we extend FG–PKEET to a two–proxy setting, where two proxies need to collaborate in order to perform an equality test. Finally, we propose a cryptosystem and prove its security in the two–proxy setting.
| Original language | English |
|---|---|
| Pages (from-to) | 304-321 |
| Number of pages | 18 |
| Journal | International journal of applied cryptography |
| Volume | 2 |
| Issue number | 4 |
| DOIs | |
| Publication status | Published - Jul 2012 |
Keywords
- Cryptosystems
- Authorisation granularity
- SCS-Cybersecurity
- Security
- Cryptography
- Equality test
- Fine–grained authorisation
- Public key encryption
Fingerprint
Dive into the research topics of 'Public key encryption schemes supporting equality test with authorisation of different granularity'. Together they form a unique fingerprint.Cite this
- APA
- Author
- BIBTEX
- Harvard
- Standard
- RIS
- Vancouver