Stronger Security Model for Public-Key Encryption with Equality Test
In CT-RSA 2010, Yang et al. suggested a new category of probabilistic public-key encryption (PKE) schemes, called public-key encryption with equality test (PKET), which supports searching on ciphertexts without decrypting them. Typical applications include management of encrypted data in an outsourced database. They presented a construction in bilinear groups, and proved that it is one-way against chosen ciphertext attack (OW-CCA) in the random oracle model. We argue that OW-CCA security may be too weak for database applications, because partial information leakage from the ciphertext is not considered in the model. In this paper, we revisit the security models for PKET, and introduce a number of new security definitions. To remark, the weakest of our definitions is still stronger than OW-CCA. We then investigate relations among these security definitions. Finally, to illustrate the usefulness of our definitions, we analyze the security of a PKET scheme , showing the scheme actually provides much stronger security than that was proven previously.
KeywordsPublic-Key Encryption with Equality Test Deterministic Encryption Searchable Encryption Semantic Security
Unable to display preview. Download preview PDF.
- 1.Abdalla, M., Bellare, M., Catalano, D., Kiltz, E., Kohno, T., Lange, T., Malone-Lee, J., Neven, G., Paillier, P., Shi, H.: Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 205–222. Springer, Heidelberg (2005)CrossRefGoogle Scholar
- 6.Bellare, M., Rogaway, P.: Random oracles are practical: a paradigm for designing effcient protocols. In: Ashby (ed.) ACM CCS 1993, pp. 62–73. ACM Press (1993)Google Scholar
- 10.Brakerski, Z., Segev, G.: Better security for deterministic public-key encryption: the auxiliary-input setting, Cryptology ePrint Archieve, Report 2011/209 (2011)Google Scholar
- 17.Hofheinz, D., Weinreb, E.: Searchable encryption with decryption in the standard model, Cryptology ePrint Archieve, Report 2008/423 (2008)Google Scholar
- 20.Menezes, A.: A introduction to pairing-based cryptography. Recent Trends in Cryptography 30, 1–19 (2005)Google Scholar
- 21.O’Neill, A.: Deterministic public-key encryption revisted. Cryptology ePrint Archieve, Report 2010/533 (2010)Google Scholar