Chinese Journal of Network and Information Security ›› 2018, Vol. 4 ›› Issue (11): 13-22.doi: 10.11959/j.issn.2096-109x.2018094

• Comprehensive Reviews • Previous Articles     Next Articles

Survey on public key encryption with equality test

Yuanhao WANG,Hongbo LI,Yuzhao CUI,Qingwen GUO,Qiong HUANG   

  1. College of Mathematics and Informatics,South China Agricultural University,Guangzhou 510642,China
  • Revised:2018-10-30 Online:2018-11-01 Published:2019-01-03
  • Supported by:
    The National Natural Science Foundation of China(61872152);Guangdong Natural Science Funds for Distinguished Young Scholar(2014A030306021);Pearl River Nova Program of Guangzhou(201610010037)


As one of the important methods of solving the problem of computation over encrypted data under multiple public keys in cloud environment,public key encryption with equality test (PKEET) supports to check whether two ciphertexts encrypted under (possibly) different public keys contain the same message without decrypting the ciphertexts.Definitions,security models and six types of authorization modes of PKEET are introduced and summarized.Besides,the relationship between PKEET and public key encryption with keyword search (PKES) is discussed.Several typical public-key,identity-based and attribute-based encryption with equality test schemes proposed recently are analyzed and compared.Furthermore,some application scenarios and research directions are discussed.

Key words: equality test, identity-based encryption, searchable encryption, cloud computing

CLC Number: 

No Suggested Reading articles found!