Abstract
In this paper we investigate a new category of public key encryption schemes which supports equality test between ciphertexts. With this new primitive, two users, who possess their own public/private key pairs, can issue token(s) to a proxy to authorize it to perform equality test between their ciphertexts. We provide a formulation and a corresponding construction for this primitive, and our formulation provides fine-grained authorization policy enforcements for users. With the increasing popularity of outsourcing data and computations to third-party service providers, this new primitive will be an important building block in designing privacy protection solutions supporting operations on encrypted data.
Original language | Undefined |
---|---|
Title of host publication | Proceedings of the 16th Australian conference on information security and privacy |
Place of Publication | London |
Publisher | Springer |
Pages | 389-406 |
Number of pages | 19 |
ISBN (Print) | 978-3-642-22497-3 |
DOIs | |
Publication status | Published - 2011 |
Event | 16th Australasian Conference on Information Security and Privacy, ACISP 2011 - RMIT University, Melbourne, Australia Duration: 11 Jul 2011 → 13 Jul 2011 Conference number: 16 |
Publication series
Name | Lecture Notes in Computer Science |
---|---|
Publisher | Springer Verlag |
Volume | 6812 |
Conference
Conference | 16th Australasian Conference on Information Security and Privacy, ACISP 2011 |
---|---|
Abbreviated title | ACISP |
Country/Territory | Australia |
City | Melbourne |
Period | 11/07/11 → 13/07/11 |
Keywords
- METIS-277611
- SCS-Cybersecurity
- EWI-20087
- IR-76721