Please use this identifier to cite or link to this item: https://doi.org/10.1007/978-3-642-11925-5_9
DC FieldValue
dc.titleProbabilistic public key encryption with equality test
dc.contributor.authorYang, G.
dc.contributor.authorTan, C.H.
dc.contributor.authorHuang, Q.
dc.contributor.authorWong, D.S.
dc.date.accessioned2014-12-12T07:36:31Z
dc.date.available2014-12-12T07:36:31Z
dc.date.issued2010
dc.identifier.citationYang, G.,Tan, C.H.,Huang, Q.,Wong, D.S. (2010). Probabilistic public key encryption with equality test. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 5985 LNCS : 119-131. ScholarBank@NUS Repository. <a href="https://doi.org/10.1007/978-3-642-11925-5_9" target="_blank">https://doi.org/10.1007/978-3-642-11925-5_9</a>
dc.identifier.isbn3642119247
dc.identifier.issn03029743
dc.identifier.urihttp://scholarbank.nus.edu.sg/handle/10635/116114
dc.description.abstractWe present a (probabilistic) public key encryption (PKE) scheme such that when being implemented in a bilinear group, anyone is able to check whether two ciphertexts are encryptions of the same message. Interestingly, bilinear map operations are not required in key generation, encryption or decryption procedures of the PKE scheme, but is only required when people want to do an equality test (on the encrypted messages) between two ciphertexts that may be generated using different public keys. We show that our PKE scheme can be used in different applications such as searchable encryption and partitioning encrypted data. Moreover, we show that when being implemented in a non-bilinear group, the security of our PKE scheme can be strengthened from One-Way CCA to a weak form of IND-CCA. © 2010 Springer-Verlag.
dc.description.urihttp://libproxy1.nus.edu.sg/login?url=http://dx.doi.org/10.1007/978-3-642-11925-5_9
dc.sourceScopus
dc.subjectAdaptive chosen ciphertext attacks
dc.subjectBilinear map
dc.subjectCiphertext comparability
dc.subjectPublic key encryption
dc.subjectSearchable encryption
dc.typeConference Paper
dc.contributor.departmentTEMASEK LABORATORIES
dc.description.doi10.1007/978-3-642-11925-5_9
dc.description.sourcetitleLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
dc.description.volume5985 LNCS
dc.description.page119-131
dc.identifier.isiutNOT_IN_WOS
Appears in Collections:Staff Publications

Show simple item record
Files in This Item:
There are no files associated with this item.

Google ScholarTM

Check

Altmetric


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.