政大機構典藏-National Chengchi University Institutional Repository(NCCUR):Item 140.119/149646
English  |  正體中文  |  简体中文  |  Post-Print筆數 : 27 |  Items with full text/Total items : 110442/141355 (78%)
Visitors : 46989222      Online Users : 1054
RC Version 6.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
Scope Tips:
  • please add "double quotation mark" for query phrases to get precise results
  • please goto advance search for comprehansive author search
  • Adv. Search
    HomeLoginUploadHelpAboutAdminister Goto mobile version
    Please use this identifier to cite or link to this item: https://nccur.lib.nccu.edu.tw/handle/140.119/149646

    Title: 基於晶格密碼學之可濾式相等性驗證公開金鑰加密
    Secure Public Key Encryption With Filtered Equality Test Over Lattices
    Authors: 簡宗祐
    Chien, Tsung-You
    Contributors: 曾一凡
    Tseng, Yi-Fan
    Chien, Tsung-You
    Keywords: 可濾式相等性驗證
    Filtered equality test
    Semantic security
    Lattice base encryption
    Date: 2023
    Issue Date: 2024-02-01 11:40:37 (UTC+8)
    Abstract: 隨著電腦科技的急速發展,對安全通信的需求也相對增加,使得加密技術在現代生活中扮演了關鍵角色。相等性驗證的公開金鑰加密 (PKE-ET),使人們在不揭露明文之下也能對加密後的密文進行比對。人們可以透過PKE-ET的特性在一群被加密的文章或資料中,透過比對而找出他們認為有用的訊息。然而傳統的PKE-ET即使滿足了單一方向的加密,卻沒辦法阻止惡意攻擊者透過相等性驗證而突破語意安全。假設攻擊者知道某個特定的密文對應於兩個可能的明文之一,可以對密文進行相等性驗證而獲得哪個明文被加密的資訊,即使攻擊者不能確切地解密密文,但他仍然可以獲得加密訊息的某些有用資訊。為了應對這些問題,引入了可濾式的相等性驗證(FET)架構,提供了一種高級的相等性驗證方法。透過引入第三方授權機關,使攻擊者只能搜尋其擁有的陷門進行測試。同時,量子電腦對傳統加密系統構成了重大威脅,因為它們有潛力更快地解決離散對數問題。值得注意的是,到2022年,美國國家標準技術研究所(NIST)將晶格密碼學作為對抗量子威脅的有力防禦方法。本篇論文延伸Li等人的具有相等性驗證的晶格公開金鑰加密及Huang等人的可濾式相等性驗證公開金鑰加密,介紹了一種基於格子加密的新型PKE-FET方案,確保了對抗量子威脅的安全性。
    With the meteoric advancement in computer technology, there has been a corresponding surge in the demand for secure communication. Consequently, encryption technology has become an indispensable component of contemporary life. Public Key Encryption with Equality Testing (PKE-ET) empowers users to juxtapose encrypted ciphertexts without divulging the underlying plaintext. Leveraging PKE-ET's capabilities, individuals can sift through an array of encrypted content to pinpoint pertinent information. Yet, the Achilles' heel of traditional PKE-ET lies in its inability to thwart malicious entities from compromising semantic security via equality verification. Hypothetically, if an adversary discerns that a given ciphertext correlates to one of two potential plaintexts, they could harness equality testing to ascertain the encrypted plaintext. While such an attacker might be stymied in their efforts to directly decrypt the ciphertext, they can nonetheless glean valuable insights from the encrypted data. The Filterable Equality Testing (FET) framework was conceived to counteract these vulnerabilities, offering a refined equality verification technique. By enlisting a third-party authorization mechanism, it's ensured that adversaries are restricted to searches using only the trapdoors in their arsenal. In parallel, the emergence of quantum computers casts a looming shadow over conventional encryption methodologies, given their innate prowess in swiftly cracking the discrete logarithm dilemma. Significantly, as of 2022, the US National Institute of Standards and Technology (NIST) recognized lattice cryptography as a bulwark against these quantum menaces. This paper augments the lattice-based public key encryption methodologies pioneered by Li et al., and the filterable encryption approach championed by Huang et al., unveiling a novel PKE-FET strategy anchored in lattice encryption that fortifies defenses against quantum threats.
    Reference: [ABB10] S. Agrawal, D. Boneh, and X. Boyen, “Efficient lattice (h)ibe in the standard model,” in Advances in Cryptology – EUROCRYPT 2010, H. Gilbert, Ed., Berlin, Heidelberg: Springer Berlin Heidelberg, 2010, pp. 553–572 (cit. p. 13).

    [CXT+21] Y.-C. Chen, X. Xie, H.-Y. Tsao, and R. Tso, “Public key encryption with filtered equality test revisited,” Designs, Codes and Cryptography, vol. 89, no. 10, pp. 2357–2372, 2021 (cit. pp. 2, 3, 21).

    [HTC17] K. Huang, R. Tso, and Y.-C. Chen, “Somewhat semantic secure public key encryption with filtered-equality-test in the standard model and its extension to searchable encryption,” Journal of Computer and System Sciences, vol. 89, pp. 400–409, 2017 (cit. pp. 1–3, 8–10, 21).

    [HTC+15] K. Huang, R. Tso, Y.-C. Chen, et al., “Pke-aet: Public key encryption with authorized equality test,” The Computer Journal, vol. 58, no. 10, pp. 2686–2697, 2015 (cit. pp. 1–3, 23).

    [LLS+20] H. T. Lee, S. Ling, J. H. Seo, H. Wang, and T.-Y. Youn, “Public key encryption with equality test in the standard model,” Information Sciences, vol. 516, pp. 89–108, 2020 (cit. p. 1).

    [LB21] Q. Li and X. Boyen, “Efficient public-key encryption with equality test from lattices,” Theoretical Computer Science, vol. 892, pp. 85–107, 2021 (cit. pp. 2, 3, 6, 7, 10, 17–19).

    [MHZ+14] S. Ma, Q. Huang, M. Zhang, and B. Yang, “Efficient public key encryption with equality test supporting flexible authorization,” IEEE Transactions on Information Forensics and Security, vol. 10, no. 3, pp. 458–470, 2014 (cit. p. 1).

    [MP12] D. Micciancio and C. Peikert, “Trapdoors for lattices: Simpler, tighter, faster, smaller,” in Advances in Cryptology – EUROCRYPT 2012, D. Pointcheval and T. Johansson, Eds., Berlin, Heidelberg: Springer Berlin Heidelberg, 2012, pp. 700–718 (cit. p. 5).

    [MW19] Y. Ming and E. Wang, “Identity-based encryption with filtered equality test for smart city applications,” Sensors, vol. 19, no. 14, 2019 (cit. pp. 2, 3, 21).

    [Tan12] Q. Tang, “Public key encryption schemes supporting equality test with authorisation of different granularity,” International journal of applied cryptography, vol. 2, no. 4, pp. 304–321, 2012 (cit. p. 1).

    [YTH+10] G. Yang, C. H. Tan, Q. Huang, and D. S. Wong, “Probabilistic public key encryption with equality test,” in Topics in Cryptology-CT-RSA 2010: The Cryptographers'Track at the RSA Conference 2010, San Francisco, CA, USA, March 1-5, 2010. Proceedings, Springer, 2010, pp. 119–131 (cit. pp. 1, 2).
    Description: 碩士
    Source URI: http://thesis.lib.nccu.edu.tw/record/#G0110753141
    Data Type: thesis
    Appears in Collections:[Department of Computer Science ] Theses

    Files in This Item:

    File Description SizeFormat
    314101.pdf410KbAdobe PDF0View/Open

    All items in 政大典藏 are protected by copyright, with all rights reserved.

    社群 sharing

    著作權政策宣告 Copyright Announcement
    The digital content of this website is part of National Chengchi University Institutional Repository. It provides free access to academic research and public education for non-commercial use. Please utilize it in a proper and reasonable manner and respect the rights of copyright owners. For commercial use, please obtain authorization from the copyright owner in advance.

    NCCU Institutional Repository is made to protect the interests of copyright owners. If you believe that any material on the website infringes copyright, please contact our staff(nccur@nccu.edu.tw). We will remove the work from the repository and investigate your claim.
    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - Feedback