Insecurity of an IBEET Scheme and an ABEET Scheme

6Citations
Citations of this article
7Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

Cloud computing is a novel pattern, which can allow users to outsource their data to the cloud servers in order to save the resource of clients. For the sake of protecting the clients' privacy, the clients' data are stored or computed in the encrypted data. This leads to a new issue: how to quickly search these encrypted data. One of the methods to solve the problem is to construct public-key encryption schemes with the equality test. In this paper, we point out that an identity-based encryption scheme with the equality test and a ciphertext-policy attribute-based encryption scheme with equality test is not secure on their security models, respectively.

Cite

CITATION STYLE

APA

Liao, Y., Chen, H., Huang, W., Mohammed, R., Pan, H., & Zhou, S. (2019). Insecurity of an IBEET Scheme and an ABEET Scheme. IEEE Access, 7, 25087–25094. https://doi.org/10.1109/ACCESS.2019.2900752

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free