4.7 Article

Public key encryption with equality test from generic assumptions in the random oracle model

期刊

INFORMATION SCIENCES
卷 500, 期 -, 页码 15-33

出版社

ELSEVIER SCIENCE INC
DOI: 10.1016/j.ins.2019.05.026

关键词

Public key encryption; Equality test; Random oracle model

资金

  1. National Research Foundation of Korea (NRF) - Korea government (MSIT) [NRF-2018R1C1B6008476]
  2. Singapore Ministry of Education [MOE2013-T2-1-041, MOE2016-T2-2014(S)]
  3. National Research Foundation, Prime Ministers Office, Singapore under its Strategic Capability Research Centres Funding Initiative
  4. Institute for Information & communications Technology Promotion (IITP) - Korea government (MSIT) [2016-6-00600]
  5. Chonbuk National University
  6. [TL-9014101684-01]

向作者/读者索取更多资源

Public key encryption with equality test (PKEET) is a variant of classical public key encryption (PKE) with the special functionality of an equality test, and can be used in many applications such as in keyword search on encrypted data and for efficient management by partitioning encrypted data in the cloud. Since the original proposal of Yang et al. (CT-RSA, 2010), several subsequent proposals to improve the efficiency or functionality of PKEET have been reported. We present a PKEET construction from generic assumptions in the random oracle model. In particular, whereas previous results require number-theoretic assumptions or strictly stronger generic assumptions such as the existence of secure hierarchical identity-based encryption, our proposal requires only the existence of cryptographic hash functions and secure PKE schemes satisfying a special property, called randomness extractability. Informally, randomness extractability means that one can recover the randomness used in a ciphertext when given a secret key corresponding to a public key for the ciphertext. We investigate the fact that PKE schemes satisfying this property can be designed by the Fujisaki-Okamoto (FO) transformation, which is the widely utilized method to obtain secure PIKE schemes from basic cryptographic primitives in the random oracle model. As a result, in combination with the FO transformation, we obtain a PKEET construction in the random oracle model if there exist a one-way PKE scheme, a one-time secure symmetric key encryption scheme, collision-resistant and one-way hash functions, and a pseudo-random function. In this sense, we remark that our PKEET construction is derived from fundamental generic assumptions only. (C) 2019 Elsevier Inc. All rights reserved.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.7
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

Article Computer Science, Information Systems

Public key encryption with equality test in the standard model

Hyung Tae Lee, San Ling, Jae Hong Seo, Huaxiong Wang, Taek-Young Youn

INFORMATION SCIENCES (2020)

Article Computer Science, Theory & Methods

Efficient revocable identity-based encryption with short public parameters

Keita Emura, Jae Hong Seo, Yohei Watanabe

Summary: Revocation functionality is crucial for managing the reliability of cryptographic systems, especially in the context of identity-based encryption (IBE) schemes such as revocable IBE (RIBE) and the security notion of decryption key exposure resistance (DKER). This paper presents an RIBE scheme that achieves adaptive security, DKER, constant-size public parameters, and is constructed over prime-order bilinear groups, building upon previous techniques. The proposed RIBE scheme can be extended to chosen-ciphertext secure and server-aided schemes.

THEORETICAL COMPUTER SCIENCE (2021)

Article Computer Science, Theory & Methods

Adaptive oblivious transfer with access control from lattice assumptions

Benoit Libert, San Ling, Fabrice Mouhartem, Khoa Nguyen, Huaxiong Wang

Summary: Adaptive oblivious transfer is a protocol where the sender commits to a database initially, allowing the receiver to query the sender multiple times to obtain specific information, with the receiver's choices potentially influenced by previously obtained messages.

THEORETICAL COMPUTER SCIENCE (2021)

Article Computer Science, Information Systems

A Comparison of Distance Bounds for Quasi-Twisted Codes

Martianus Frederic Ezerman, John Mark Lampos, San Ling, Buket Ozkaya, Jareena Tharnnukhroh

Summary: The spectral bounds on the minimum distance of quasi-twisted codes over finite fields are proposed based on eigenvalues of polynomial matrices and eigenspaces. The relationship between eigencodes of quasi-twisted codes and outer codes in its concatenated structure is explored, and comparisons show that the Jensen bound outperforms the spectral bound under special conditions. Performance comparisons of the Lally, Jensen, and spectral bounds are presented.

IEEE TRANSACTIONS ON INFORMATION THEORY (2021)

Article Computer Science, Information Systems

Hulls of Reed-Solomon Codes via Algebraic Geometry Codes

Bocong Chen, San Ling, Hongwei Liu

Summary: In this paper, the dimension of the hull RSk(a) boolean AND RSk(a)(perpendicular to) is completely determined in terms of the degree of the derivative of h and some relevant polynomials by expressing RSk(a) as an L-construction algebraic geometry code. As applications, the parameters of MDS entanglement-assisted quantum error-correcting codes constructed from RS codes are explicitly determined, and all linear complementary dual (resp. self-dual) RS codes are also fully described.

IEEE TRANSACTIONS ON INFORMATION THEORY (2023)

Article Computer Science, Information Systems

A Construction of Maximum Distance Profile Convolutional Codes With Small Alphabet Sizes

Gaojun Luo, Xiwang Cao, Martianus Frederic Ezerman, San Ling

Summary: In this paper, a new family of matrices is proposed by combining Vandermonde and Moore matrices. Using these matrices, a new family of convolutional codes with memory 1 and maximum distance profile is constructed. The alphabet sizes of these codes can be significantly smaller than previous results while maintaining the code rate.

IEEE TRANSACTIONS ON INFORMATION THEORY (2023)

Article Computer Science, Information Systems

Three New Constructions of Optimal Locally Repairable Codes From Matrix-Product Codes

Gaojun Luo, Martianus Frederic Ezerman, San Ling

Summary: This paper focuses on constructing locally repairable codes that achieve equality in the Singleton-type bound with (r, delta)-locality. We propose two constructions of q-ary optimal (r, delta) locally repairable codes with lengths up to q(2)+q using matrix-product codes, which include linear maximum distance separable codes. Additionally, we provide another construction of optimal (r, delta) locally repairable codes by utilizing optimal locally repairable codes as ingredients in the matrix-product approach. These three constructions are new and cover different parameter sets compared to previously constructed codes in the literature. Our construction proposals offer flexibility by allowing variations in r and delta for various scenarios.

IEEE TRANSACTIONS ON INFORMATION THEORY (2023)

Article Computer Science, Theory & Methods

On the security of functional encryption in the generic group model

Hyung Tae Lee, Jae Hong Seo

Summary: In this paper, the authors refine the definitions of the generic group model and security notions for functional encryption schemes. They then prove that for certain group-based functional encryption schemes satisfying specific conditions, they can reduce from selective security in the standard model to adaptive security in the generic group model, regardless of the functionalities of the schemes.

DESIGNS CODES AND CRYPTOGRAPHY (2023)

Article Computer Science, Information Systems

New Families of MDS Symbol-Pair Codes From Matrix-Product Codes

Gaojun Luo, Martianus Frederic Ezerman, San Ling, Xu Pan

Summary: In emerging storage technologies, the use of symbol-pair codes has been proposed as a solution to control errors caused by overlapping pairs of symbols in channel outputs. Instead of the usual minimum Hamming distance, the error-correcting capability of these codes depends on their minimum pair distance. Longer codes can be constructed conveniently from shorter ones using a matrix-product approach, and the parameters of a matrix-product code can be determined from the parameters of the ingredient codes. New families of MDS and almost MDS symbol-pair matrix-product codes have been constructed, which offer improved minimum pair distances compared to permutation equivalent codes.

IEEE TRANSACTIONS ON INFORMATION THEORY (2023)

Proceedings Paper Computer Science, Information Systems

Efficient Zero-Knowledge Arguments in Discrete Logarithm Setting: Sublogarithmic Proof or Sublinear Verifier

Sungwook Kim, Hyeonbum Lee, Jae Hong Seo

Summary: This paper proposes three interactive zero-knowledge arguments for arithmetic circuit of size N in the common random string model, which can be converted to be non-interactive by Fiat-Shamir heuristics in the random oracle model. The three arguments have different communication and computational complexities, and the third argument does not rely on pairing-friendly elliptic curves. The soundness of the three arguments is proven under the standard discrete logarithm and/or the double pairing assumption.

ADVANCES IN CRYPTOLOGY- ASIACRYPT 2022, PT II (2022)

Article Computer Science, Information Systems

Analysis on Secure Triplet Loss

Bora Jeong, Sunpill Kim, Seunghun Paik, Jae Hong Seo

Summary: This study presents a deep learning-based technique for improved biometric authentication, specifically in facial recognition. It also introduces a method for protecting the feature vectors used in the recognition process. Additionally, an impersonation attack is proposed to assess the security of the protection method.

IEEE ACCESS (2022)

Proceedings Paper Computer Science, Information Systems

Monitoring Provenance of Delegated Personal Data with Blockchain

Chanyang Ju, Wenyi Tang, Changhao Chenli, Gwangwoon Lee, Jae Hong Seo, Taeho Jung

Summary: Personal data provenance monitoring is necessary for transparency and accountability, but it faces challenges due to decentralized service provider relationships. We propose using blockchain to track data provenance and introduce a new extended vector commitment scheme. Experimental results show that the overhead of this scheme is negligible in most processes and acceptable in others.

2022 IEEE INTERNATIONAL CONFERENCE ON BLOCKCHAIN (BLOCKCHAIN 2022) (2022)

Article Computer Science, Information Systems

Bulletproofs plus : Shorter Proofs for a Privacy-Enhanced Distributed Ledger

Heewon Chung, Kyoohyung Han, Chanyang Ju, Myungsun Kim, Jae Hong Seo

Summary: This paper presents a new short zero-knowledge argument for range proof and arithmetic circuits that does not require a trusted setup. It achieves the shortest proof size among similar systems without a trusted setup. The proposed method, Bulletproofs+, reduces both range proof and arithmetic circuit proof sizes, while maintaining comparable computational overheads to Bulletproofs. It has been recognized as an improvement over Bulletproofs with its zero-knowledge weighted inner product argument.

IEEE ACCESS (2022)

Proceedings Paper Computer Science, Artificial Intelligence

IronMask: Modular Architecture for Protecting Deep Face Template

Sunpill Kim, Yunseong Jeong, Jinsu Kim, Jungkon Kim, Hyung Tae Lee, Jae Hong Seo

Summary: In this study, a modular architecture called IronMask was proposed for protecting face templates, and its effectiveness was evaluated through experiments with two face recognition systems. IronMask maintains high recognition performance while protecting user privacy, providing a high level of security against known attacks.

2021 IEEE/CVF CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION, CVPR 2021 (2021)

Article Computer Science, Information Systems

Efficient Sum-Check Protocol for Convolution

Chanyang Ju, Hyeonbum Lee, Heewon Chung, Jae Hong Seo, Sungwook Kim

Summary: The paper focuses on verifying the accuracy of CNNs in image recognition and classification, proposing a predicate function based on validating matrix multiplication operations. By reducing the proving cost, an efficient sum-check protocol is provided for convolution operations, which is approximately 2x cheaper in terms of communication costs compared to the state-of-the-art zkCNN approach.

IEEE ACCESS (2021)

Article Computer Science, Information Systems

A consensus model considers managing manipulative and overconfident behaviours in large-scale group decision-making

Xia Liang, Jie Guo, Peide Liu

Summary: This paper investigates a novel consensus model based on social networks to manage manipulative and overconfident behaviors in large-scale group decision-making. By proposing a novel clustering model and improved methods, the consensus reaching is effectively facilitated. The feedback mechanism and management approach are employed to handle decision makers' behaviors. Simulation experiments and comparative analysis demonstrate the effectiveness of the model.

INFORMATION SCIENCES (2024)

Article Computer Science, Information Systems

CGN: Class gradient network for the construction of adversarial samples

Xiang Li, Haiwang Guo, Xinyang Deng, Wen Jiang

Summary: This paper proposes a method based on class gradient networks for generating high-quality adversarial samples. By introducing a high-level class gradient matrix and combining classification loss and perturbation loss, the method demonstrates superiority in the transferability of adversarial samples on targeted attacks.

INFORMATION SCIENCES (2024)

Article Computer Science, Information Systems

Distinguishing latent interaction types from implicit feedbacks for recommendation

Lingyun Lu, Bang Wang, Zizhuo Zhang, Shenghao Liu

Summary: Many recommendation algorithms only rely on implicit feedbacks due to privacy concerns. However, the encoding of interaction types is often ignored. This paper proposes a relation-aware neural model that classifies implicit feedbacks by encoding edges, thereby enhancing recommendation performance.

INFORMATION SCIENCES (2024)

Article Computer Science, Information Systems

Proximity-based density description with regularized reconstruction algorithm for anomaly detection

Jaehong Yu, Hyungrok Do

Summary: This study discusses unsupervised anomaly detection using one-class classification, which determines whether a new instance belongs to the target class by constructing a decision boundary. The proposed method uses a proximity-based density description and a regularized reconstruction algorithm to overcome the limitations of existing one-class classification methods. Experimental results demonstrate the superior performance of the proposed algorithm.

INFORMATION SCIENCES (2024)

Article Computer Science, Information Systems

Non-iterative border-peeling clustering algorithm based on swap strategy

Hui Tu, Shifei Ding, Xiao Xu, Haiwei Hou, Chao Li, Ling Ding

Summary: Border-Peeling algorithm is a density-based clustering algorithm, but its complexity and issues on unbalanced datasets restrict its application. This paper proposes a non-iterative border-peeling clustering algorithm, which improves the clustering performance by distinguishing and associating core points and border points.

INFORMATION SCIENCES (2024)

Article Computer Science, Information Systems

A two-stage denoising framework for zero-shot learning with noisy labels

Long Tang, Pan Zhao, Zhigeng Pan, Xingxing Duan, Panos M. Pardalos

Summary: In this work, a two-stage denoising framework (TSDF) is proposed for zero-shot learning (ZSL) to address the issue of noisy labels. The framework includes a tailored loss function to remove suspected noisy-label instances and a ramp-style loss function to reduce the negative impact of remaining noisy labels. In addition, a dynamic screening strategy (DSS) is developed to efficiently handle the nonconvexity of the ramp-style loss.

INFORMATION SCIENCES (2024)

Article Computer Science, Information Systems

Selection of a viable blockchain service provider for data management within the internet of medical things: An MCDM approach to Indian healthcare

Raghunathan Krishankumar, Sundararajan Dhruva, Kattur S. Ravichandran, Samarjit Kar

Summary: Health 4.0 is gaining global attention for better healthcare through digital technologies. This study proposes a new decision-making framework for selecting viable blockchain service providers in the Internet of Medical Things (IoMT). The framework addresses the limitations in previous studies and demonstrates its applicability in the Indian healthcare sector. The results show the top ranking BSPs, the importance of various criteria, and the effectiveness of the developed model.

INFORMATION SCIENCES (2024)

Article Computer Science, Information Systems

Q-learning with heterogeneous update strategy

Tao Tan, Hong Xie, Liang Feng

Summary: This paper proposes a heterogeneous update idea and designs HetUp Q-learning algorithm to enlarge the normalized gap by overestimating the Q-value corresponding to the optimal action and underestimating the Q-value corresponding to the other actions. To address the limitation, a softmax strategy is applied to estimate the optimal action, resulting in HetUpSoft Q-learning and HetUpSoft DQN. Extensive experimental results show significant improvements over SOTA baselines.

INFORMATION SCIENCES (2024)

Article Computer Science, Information Systems

Dyformer: A dynamic transformer-based architecture for multivariate time series classification

Chao Yang, Xianzhi Wang, Lina Yao, Guodong Long, Guandong Xu

Summary: This paper proposes a dynamic transformer-based architecture called Dyformer for multivariate time series classification. Dyformer captures multi-scale features through hierarchical pooling and adaptive learning strategies, and improves model performance by introducing feature-map-wise attention mechanisms and a joint loss function.

INFORMATION SCIENCES (2024)

Article Computer Science, Information Systems

ESSENT: an arithmetic optimization algorithm with enhanced scatter search strategy for automated test case generation

Xiguang Li, Baolu Feng, Yunhe Sun, Ammar Hawbani, Saeed Hammod Alsamhi, Liang Zhao

Summary: This paper proposes an enhanced scatter search strategy, using opposition-based learning, to solve the problem of automated test case generation based on path coverage (ATCG-PC). The proposed ESSENT algorithm selects the path with the lowest path entropy among the uncovered paths as the target path and generates new test cases to cover the target path by modifying the dimensions of existing test cases. Experimental results show that the ESSENT algorithm outperforms other state-of-the-art algorithms, achieving maximum path coverage with fewer test cases.

INFORMATION SCIENCES (2024)

Article Computer Science, Information Systems

An attention based approach for automated account linkage in federated identity management

Shirin Dabbaghi Varnosfaderani, Piotr Kasprzak, Aytaj Badirova, Ralph Krimmel, Christof Pohl, Ramin Yahyapour

Summary: Linking digital accounts belonging to the same user is crucial for security, user satisfaction, and next-generation service development. However, research on account linkage is mainly focused on social networks, and there is a lack of studies in other domains. To address this, we propose SmartSSO, a framework that automates the account linkage process by analyzing user routines and behavior during login processes. Our experiments on a large dataset show that SmartSSO achieves over 98% accuracy in hit-precision.

INFORMATION SCIENCES (2024)

Article Computer Science, Information Systems

A memetic algorithm with fuzzy-based population control for the joint order batching and picker routing problem

Renchao Wu, Jianjun He, Xin Li, Zuguo Chen

Summary: This paper proposes a memetic algorithm with fuzzy-based population control (MA-FPC) to solve the joint order batching and picker routing problem (JOBPRP). The algorithm incorporates batch exchange crossover and a two-level local improvement procedure. Experimental results show that MA-FPC outperforms existing algorithms in terms of solution quality.

INFORMATION SCIENCES (2024)

Article Computer Science, Information Systems

Refining one-class representation: A unified transformer for unsupervised time-series anomaly detection

Guoxiang Zhong, Fagui Liu, Jun Jiang, Bin Wang, C. L. Philip Chen

Summary: In this study, we propose the AMFormer framework to address the problem of mixed normal and anomaly samples in deep unsupervised time-series anomaly detection. By refining the one-class representation and introducing the masked operation mechanism and cost sensitive learning theory, our approach significantly improves anomaly detection performance.

INFORMATION SCIENCES (2024)

Article Computer Science, Information Systems

A data-driven optimisation method for a class of problems with redundant variables and indefinite objective functions

Jin Zhou, Kang Zhou, Gexiang Zhang, Ferrante Neri, Wangyang Shen, Weiping Jin

Summary: In this paper, the authors focus on the issue of multi-objective optimisation problems with redundant variables and indefinite objective functions (MOPRVIF) in practical problem-solving. They propose a dual data-driven method for solving this problem, which consists of eliminating redundant variables, constructing objective functions, selecting evolution operators, and using a multi-objective evolutionary algorithm. The experiments conducted on two different problem domains demonstrate the effectiveness, practicality, and scalability of the proposed method.

INFORMATION SCIENCES (2024)

Article Computer Science, Information Systems

A Monte Carlo fuzzy logistic regression framework against imbalance and separation

Georgios Charizanos, Haydar Demirhan, Duygu Icen

Summary: This article proposes a new fuzzy logistic regression framework that addresses the problems of separation and imbalance while maintaining the interpretability of classical logistic regression. By fuzzifying binary variables and classifying subjects based on a fuzzy threshold, the framework demonstrates superior performance on imbalanced datasets.

INFORMATION SCIENCES (2024)