ACKNOWLEDGEMENTS
This research is supported by the Ministry of Science
and Technology, Taiwan, R.O.C., under Grant MOST
103-2221-E-004-009. We appreciate the anonymous
reviewers for their valuable suggestions.
REFERENCES
Bellare, M., Boldyreva, A., and Micali, S. (2000). Public-
key encryption in a multi-user setting: Security proofs
and improvements. In EUROCRYPT, pages 259–274.
Chatterjee, S. and Menezes, A. (2011). On crypto-
graphic protocols employing asymmetric pairings -
the role of revisited. Discrete Applied Mathematics,
159(13):1311–1322.
Diffie, W. and Hellman, M. E. (1976). New directions in
cryptography. IEEE Transactions on Information The-
ory, 22(6):644–654.
Fouque, P., Joux, A., and Mavromati, C. (2014). Multi-user
collisions: Applications to discrete logarithm, even-
mansour and PRINCE. In Advances in Cryptology -
ASIACRYPT 2014 - 20th International Conference on
the Theory and Application of Cryptology and Infor-
mation Security, Kaoshiung, Taiwan, R.O.C., Decem-
ber 7-11, 2014. Proceedings, Part I, pages 420–438.
Galbraith, S. D., Paterson, K. G., and Smart, N. P. (2008).
Pairings for cryptographers. Discrete Applied Mathe-
matics, 156(16):3113–3121.
Gamal, T. E. (1985). A public key cryptosystem and a sig-
nature scheme based on discrete logarithms. IEEE
Transactions on Information Theory, 31(4):469–472.
Ghadafi, E., Smart, N. P., and Warinschi, B. (2010). Groth-
sahai proofs revisited. In Public Key Cryptography
- PKC 2010, 13th International Conference on Prac-
tice and Theory in Public Key Cryptography, Paris,
France, May 26-28, 2010. Proceedings, pages 177–
192.
Huang, K., Tso, R., Chen, Y., Li, W., and Sun, H. (2014). A
new public key encryption with equality test. In Net-
work and System Security - 8th International Confer-
ence, NSS 2014, Xi’an, China, October 15-17, 2014,
Proceedings, pages 550–557.
Huang, K., Tso, R., Chen, Y.-C., Rahman, S. M. M., Almo-
gren, A., and Alamri, A. (2015). Pke-aet: Public key
encryption with authorized equality test. The Com-
puter Journal, page bxv025.
Ma, S., Zhang, M., Huang, Q., and Yang, B. (2014). Public
key encryption with delegated equality test in a multi-
user setting. The Computer Journal.
Naor, M. and Yung, M. (1989). Universal one-way hash
functions and their cryptographic applications. In Pro-
ceedings of the 21st Annual ACM Symposium on The-
ory of Computing, May 14-17, 1989, Seattle, Washig-
ton, USA, pages 33–43.
Peng, K., Boyd, C., Dawson, E., and Lee, B. (2005). Ci-
phertext comparison, a new solution to the millionaire
problem. In ICICS, pages 84–96.
Sakurai, K. and Shizuya, H. (1995). Relationships among
the computational powers of breaking discrete log
cryptosystems. In EUROCRYPT, pages 341–355.
Shamir, A. (1979). How to share a secret. Commun. ACM,
22(11):612–613.
Shoup, V. (2004). Sequences of games: a tool for tam-
ing complexity in security proofs. IACR Cryptology
ePrint Archive, 2004:332.
Tang, Q. (2012a). Public key encryption schemes support-
ing equality test with authorisation of different granu-
larity. IJACT, 2(4):304–321.
Tang, Q. (2012b). Public key encryption supporting plain-
text equality test and user-specified authorization. Se-
curity and Communication Networks, 5(12):1351–
1362.
Yang, G., Tan, C. H., Huang, Q., and Wong, D. S. (2010).
Probabilistic public key encryption with equality test.
In CT-RSA, pages 119–131.
SECRYPT2015-InternationalConferenceonSecurityandCryptography
334