Browse > Article
http://dx.doi.org/10.13089/JKIISC.2013.23.2.267

A Security Hole in Comparable Encryption  

Kim, Sangjin (Korea University of Technology and Education)
Oh, Heekuck (Hanyang University)
Abstract
Comparable encryption allows a verifier to test whether given two ciphertexts from a probabilistic public key cryptosystem are encryption of the same message without decrypting them. Recently, Yang et al. proposed such scheme and Lee et al. and Tang independently modified Yang et al.'s system to restrict the entity who can perform the verification. However, the original Yang et al.'s scheme has a flaw that enables two ciphertexts which are not encryption of the same message to pass the test. In this paper, we concretely show the faults in all three schemes considered and analyze the effect of this flaw in the use of such schemes in applications.
Keywords
Comparable Encryption; Searchable Encryption;
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
연도 인용수 순위
1 Q. Tang, "Public key encryption supporting plaintext equality test and user-specified authorization," Security and Communication Networks, vol. 5, no. 12, pp. 1351-1362, Dec. 2012.   DOI
2 S. Canard, G. Fuchsbauer, A. Gouget, and F. Laguillaumie, "Plaintext-checkable encryption," Proceedings of the Cryptographis' Track at the RSA Conference, LNCS 7178, pp. 332-348, Mar. 2012
3 I.R. Jeong, J.O. Kwon, D.W. Hong, and D.H. Lee, "Constructing PEKS schemes secure against keyword guessing attacks is possible?," Computer Communications, vol. 32, no. 2, pp. 394-396, Feb. 2009.   DOI   ScienceOn
4 J. Baek, R. Safavi-Naini, and W. Susilo, "On the integration of public key data encryption and public key encryption with keyword search," Proceedings of the 9th International Conference on Information Security, LNCS 4176, pp. 217-232, Sept. 2006.
5 G. Yang, C.H. Tan, Q. Huang, and D.S. Wong, "Probabilistic public key encryption with equality test," Proceedings of the Cryptographis' Track at the RSA Conference, LNCS 5985, pp. 119-131, Mar. 2010.
6 이영민, 구우권, 이현숙, 이동훈, "고정된 검사자를 고려한 메시지 동일성 검사 공개키 암호시스템," 정보보호학회논문지, 21(5), pp. 3-13, 2011년 10월.