Security Analysis and Modification of ID-Based Encryption with Equality Test from ACISP 2017

  • Hyung Tae Lee
  • Huaxiong Wang
  • Kai ZhangEmail author
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 10946)


At ACISP 2017, Wu et al. provided an identity-based encryption scheme with equality test that considers to prevent insider attacks. In this paper, we demonstrate that their scheme does not achieve the claimed security requirement by presenting an attack. Subsequently, we provide a modification of their construction.



We would like to thank the authors of [7] and the anonymous reviewers of ACISP 2018 for their valuable comments and discussions. Hyung Tae Lee would also like to thank Jae Hong Seo for the helpful discussion about a keyed permutation in our modification. Hyung Tae Lee was supported by Basic Science Research Program through the National Research Foundation of Korea (NRF) funded by the Ministry of Science and ICT (No. NRF-2018R1C1B6008476). Huaxiong Wang was supported by Singapore Ministry of Education under Research Grant MOE2016-T2-2-014(S) and RG133/17-(S). Kai Zhang was supported by the Open Foundation of Co-Innovation Center for Information Supply & Assurance Technology (No. ADXXBZ201701).


  1. 1.
    Katz, J., Lindell, Y.: Introduction to Modern Cryptography. Chapman & Hall/CRC, London (2008)zbMATHGoogle Scholar
  2. 2.
    Lee, H.T., Ling, S., Seo, J.H., Wang, H.: Semi-generic construction of public key encryption and identity-based encryption with equality test. Inf. Sci. 373, 419–440 (2016)CrossRefzbMATHGoogle Scholar
  3. 3.
    Lee, H.T., Ling, S., Seo, J.H., Wang, H., Youn, T.: Public key encryption with equality test in the standard model. IACR Cryptol. ePrint Archive 2016, 1182 (2016)Google Scholar
  4. 4.
    Lee, H.T., Wang, H., Zhang, K.: Security analysis and modification of ID-based encryption with equality test from ACISP 2017. IACR Cryptol. ePrint Archive 2018, 369 (2018)zbMATHGoogle Scholar
  5. 5.
    Ma, S.: Identity-based encryption with outsourced equality test in cloud computing. Inf. Sci. 328, 389–402 (2016)CrossRefzbMATHGoogle Scholar
  6. 6.
    Wu, L., Zhang, Y., Choo, K.R., He, D.: Efficient and secure identity-based encryption scheme with equality test in cloud computing. Future Gener. Comp. Syst. 73, 22–31 (2017)CrossRefGoogle Scholar
  7. 7.
    Wu, T., Ma, S., Mu, Y., Zeng, S.: ID-based encryption with equality test against insider attack. In: Pieprzyk, J., Suriadi, S. (eds.) ACISP 2017. LNCS, vol. 10342, pp. 168–183. Springer, Cham (2017). Scholar

Copyright information

© Springer International Publishing AG, part of Springer Nature 2018

Authors and Affiliations

  1. 1.Division of Computer Science and Engineering, College of EngineeringChonbuk National UniversityJeonjuRepublic of Korea
  2. 2.Division of Mathematical Sciences, School of Physical and Mathematical SciencesNanyang Technological UniversitySingaporeSingapore
  3. 3.Department of Information Security, College of Computer Science and TechnologyShanghai University of Electric PowerShanghaiChina
  4. 4.Co-Innovation Center for Information Supply & Assurance TechnologyAnhui UniversityHefeiChina

Personalised recommendations