Insecurity of an IBEET Scheme and an ABEET Scheme
Cloud computing is a novel pattern, which can allow users to outsource their data to the cloud servers in order to save the resource of clients. For the sake of protecting the clients' privacy, the clients' data are stored or computed in the encrypted data. This leads to a new issue: how t...
Main Authors: | , , , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
IEEE
2019-01-01
|
Series: | IEEE Access |
Subjects: | |
Online Access: | https://ieeexplore.ieee.org/document/8648436/ |
_version_ | 1818416111712993280 |
---|---|
author | Yongjian Liao Hongjie Chen Wen Huang Ramadan Mohammed Hongtao Pan Shijie Zhou |
author_facet | Yongjian Liao Hongjie Chen Wen Huang Ramadan Mohammed Hongtao Pan Shijie Zhou |
author_sort | Yongjian Liao |
collection | DOAJ |
description | Cloud computing is a novel pattern, which can allow users to outsource their data to the cloud servers in order to save the resource of clients. For the sake of protecting the clients' privacy, the clients' data are stored or computed in the encrypted data. This leads to a new issue: how to quickly search these encrypted data. One of the methods to solve the problem is to construct public-key encryption schemes with the equality test. In this paper, we point out that an identity-based encryption scheme with the equality test and a ciphertext-policy attribute-based encryption scheme with equality test is not secure on their security models, respectively. |
first_indexed | 2024-12-14T11:45:42Z |
format | Article |
id | doaj.art-9e2a175b777243828be0af65fc87c87d |
institution | Directory Open Access Journal |
issn | 2169-3536 |
language | English |
last_indexed | 2024-12-14T11:45:42Z |
publishDate | 2019-01-01 |
publisher | IEEE |
record_format | Article |
series | IEEE Access |
spelling | doaj.art-9e2a175b777243828be0af65fc87c87d2022-12-21T23:02:36ZengIEEEIEEE Access2169-35362019-01-017250872509410.1109/ACCESS.2019.29007528648436Insecurity of an IBEET Scheme and an ABEET SchemeYongjian Liao0https://orcid.org/0000-0003-3139-8528Hongjie Chen1Wen Huang2Ramadan Mohammed3Hongtao Pan4Shijie Zhou5School of Information and Software Engineering, University of Electronic Science and Technology of China, Chengdu, ChinaSchool of Information and Software Engineering, University of Electronic Science and Technology of China, Chengdu, ChinaSchool of Information and Software Engineering, University of Electronic Science and Technology of China, Chengdu, ChinaSchool of Information and Software Engineering, University of Electronic Science and Technology of China, Chengdu, ChinaSchool of Information and Software Engineering, University of Electronic Science and Technology of China, Chengdu, ChinaSchool of Information and Software Engineering, University of Electronic Science and Technology of China, Chengdu, ChinaCloud computing is a novel pattern, which can allow users to outsource their data to the cloud servers in order to save the resource of clients. For the sake of protecting the clients' privacy, the clients' data are stored or computed in the encrypted data. This leads to a new issue: how to quickly search these encrypted data. One of the methods to solve the problem is to construct public-key encryption schemes with the equality test. In this paper, we point out that an identity-based encryption scheme with the equality test and a ciphertext-policy attribute-based encryption scheme with equality test is not secure on their security models, respectively.https://ieeexplore.ieee.org/document/8648436/Identity based encryptionattribute based encryptionequality testinsecuritycloud computing |
spellingShingle | Yongjian Liao Hongjie Chen Wen Huang Ramadan Mohammed Hongtao Pan Shijie Zhou Insecurity of an IBEET Scheme and an ABEET Scheme IEEE Access Identity based encryption attribute based encryption equality test insecurity cloud computing |
title | Insecurity of an IBEET Scheme and an ABEET Scheme |
title_full | Insecurity of an IBEET Scheme and an ABEET Scheme |
title_fullStr | Insecurity of an IBEET Scheme and an ABEET Scheme |
title_full_unstemmed | Insecurity of an IBEET Scheme and an ABEET Scheme |
title_short | Insecurity of an IBEET Scheme and an ABEET Scheme |
title_sort | insecurity of an ibeet scheme and an abeet scheme |
topic | Identity based encryption attribute based encryption equality test insecurity cloud computing |
url | https://ieeexplore.ieee.org/document/8648436/ |
work_keys_str_mv | AT yongjianliao insecurityofanibeetschemeandanabeetscheme AT hongjiechen insecurityofanibeetschemeandanabeetscheme AT wenhuang insecurityofanibeetschemeandanabeetscheme AT ramadanmohammed insecurityofanibeetschemeandanabeetscheme AT hongtaopan insecurityofanibeetschemeandanabeetscheme AT shijiezhou insecurityofanibeetschemeandanabeetscheme |