Insecurity of an IBEET Scheme and an ABEET Scheme

Cloud computing is a novel pattern, which can allow users to outsource their data to the cloud servers in order to save the resource of clients. For the sake of protecting the clients' privacy, the clients' data are stored or computed in the encrypted data. This leads to a new issue: how t...

Full description

Bibliographic Details
Main Authors: Yongjian Liao, Hongjie Chen, Wen Huang, Ramadan Mohammed, Hongtao Pan, Shijie Zhou
Format: Article
Language:English
Published: IEEE 2019-01-01
Series:IEEE Access
Subjects:
Online Access:https://ieeexplore.ieee.org/document/8648436/
_version_ 1818416111712993280
author Yongjian Liao
Hongjie Chen
Wen Huang
Ramadan Mohammed
Hongtao Pan
Shijie Zhou
author_facet Yongjian Liao
Hongjie Chen
Wen Huang
Ramadan Mohammed
Hongtao Pan
Shijie Zhou
author_sort Yongjian Liao
collection DOAJ
description Cloud computing is a novel pattern, which can allow users to outsource their data to the cloud servers in order to save the resource of clients. For the sake of protecting the clients' privacy, the clients' data are stored or computed in the encrypted data. This leads to a new issue: how to quickly search these encrypted data. One of the methods to solve the problem is to construct public-key encryption schemes with the equality test. In this paper, we point out that an identity-based encryption scheme with the equality test and a ciphertext-policy attribute-based encryption scheme with equality test is not secure on their security models, respectively.
first_indexed 2024-12-14T11:45:42Z
format Article
id doaj.art-9e2a175b777243828be0af65fc87c87d
institution Directory Open Access Journal
issn 2169-3536
language English
last_indexed 2024-12-14T11:45:42Z
publishDate 2019-01-01
publisher IEEE
record_format Article
series IEEE Access
spelling doaj.art-9e2a175b777243828be0af65fc87c87d2022-12-21T23:02:36ZengIEEEIEEE Access2169-35362019-01-017250872509410.1109/ACCESS.2019.29007528648436Insecurity of an IBEET Scheme and an ABEET SchemeYongjian Liao0https://orcid.org/0000-0003-3139-8528Hongjie Chen1Wen Huang2Ramadan Mohammed3Hongtao Pan4Shijie Zhou5School of Information and Software Engineering, University of Electronic Science and Technology of China, Chengdu, ChinaSchool of Information and Software Engineering, University of Electronic Science and Technology of China, Chengdu, ChinaSchool of Information and Software Engineering, University of Electronic Science and Technology of China, Chengdu, ChinaSchool of Information and Software Engineering, University of Electronic Science and Technology of China, Chengdu, ChinaSchool of Information and Software Engineering, University of Electronic Science and Technology of China, Chengdu, ChinaSchool of Information and Software Engineering, University of Electronic Science and Technology of China, Chengdu, ChinaCloud computing is a novel pattern, which can allow users to outsource their data to the cloud servers in order to save the resource of clients. For the sake of protecting the clients' privacy, the clients' data are stored or computed in the encrypted data. This leads to a new issue: how to quickly search these encrypted data. One of the methods to solve the problem is to construct public-key encryption schemes with the equality test. In this paper, we point out that an identity-based encryption scheme with the equality test and a ciphertext-policy attribute-based encryption scheme with equality test is not secure on their security models, respectively.https://ieeexplore.ieee.org/document/8648436/Identity based encryptionattribute based encryptionequality testinsecuritycloud computing
spellingShingle Yongjian Liao
Hongjie Chen
Wen Huang
Ramadan Mohammed
Hongtao Pan
Shijie Zhou
Insecurity of an IBEET Scheme and an ABEET Scheme
IEEE Access
Identity based encryption
attribute based encryption
equality test
insecurity
cloud computing
title Insecurity of an IBEET Scheme and an ABEET Scheme
title_full Insecurity of an IBEET Scheme and an ABEET Scheme
title_fullStr Insecurity of an IBEET Scheme and an ABEET Scheme
title_full_unstemmed Insecurity of an IBEET Scheme and an ABEET Scheme
title_short Insecurity of an IBEET Scheme and an ABEET Scheme
title_sort insecurity of an ibeet scheme and an abeet scheme
topic Identity based encryption
attribute based encryption
equality test
insecurity
cloud computing
url https://ieeexplore.ieee.org/document/8648436/
work_keys_str_mv AT yongjianliao insecurityofanibeetschemeandanabeetscheme
AT hongjiechen insecurityofanibeetschemeandanabeetscheme
AT wenhuang insecurityofanibeetschemeandanabeetscheme
AT ramadanmohammed insecurityofanibeetschemeandanabeetscheme
AT hongtaopan insecurityofanibeetschemeandanabeetscheme
AT shijiezhou insecurityofanibeetschemeandanabeetscheme