Identity-Based Encryption with Equality Test Supporting Accountable Authorization in Cloud Computing

被引:0
|
作者
机构
[1] Xidian University,School of Cyber Engineering
[2] Henan Key Laboratory of Network Cryptography Technology,School of Cyberspace Security
[3] Xi’an University of Posts and Telecommunications,undefined
关键词
identity-based encryption with equality test; accountable authorization; cloud computing; Gentry’s IBE; zero-knowledge proof;
D O I
10.1007/s11390-024-2933-y
中图分类号
学科分类号
摘要
Identity-based encryption with equality test (IBEET) is proposed to check whether the underlying messages of ciphertexts, even those encrypted with different public keys, are the same or not without decryption. Since people prefer to encrypt before outsourcing their data for privacy protection nowadays, the research of IBEET on cloud computing applications naturally attracts attention. However, we claim that the existing IBEET schemes suffer from the illegal trapdoor sharing problem caused by the inherited key escrow problem of the Identity-Based Encryption (IBE) mechanism. In traditional IBEET, the private key generator (PKG) with the master secret key generates trapdoors for all authorized cloud servers. Considering the reality in practice, the PKG is usually not fully trusted. In this case, the Private-Key Generator (PKG) may generate, share, or even sell any trapdoor without any risk of being caught, or not being held accountable, which may lead to serious consequences such as the illegal sharing of a gene bank’s trapdoors. In this paper, to relieve the illegal trapdoor sharing problem in IBEET, we present a new notion, called IBEET Supporting Accountable Authorization (IBEET-AA). In IBEET-AA, if there is a disputed trapdoor, the generator will be distinguished among the PKG and suspected testers by an additional tracing algorithm. For the additional tracing function, except for the traditional indistinguishability (IND) and one-way (OW) security models in IBEET, we define three more security models to protect the tracing security against dishonest authorizers, PKG, and testers, respectively. Based on Gentry’s IBE scheme, we instantiate IBEET-AA and give a specific construction along with a formalized security proof with random oracles.
引用
收藏
页码:215 / 228
页数:13
相关论文
共 50 条
  • [1] An Efficient Identity-Based Encryption With Equality Test in Cloud Computing
    Yang, Zhichao
    He, Debiao
    Qu, Longjiang
    Ye, Qing
    IEEE TRANSACTIONS ON CLOUD COMPUTING, 2023, 11 (03) : 2983 - 2992
  • [2] Identity-based encryption with outsourced equality test in cloud computing
    Ma, Sha
    INFORMATION SCIENCES, 2016, 328 : 389 - 402
  • [3] Efficient and secure identity-based encryption scheme with equality test in cloud computing
    Wu, Libing
    Zhang, Yubo
    Choo, Kim-Kwang Raymond
    He, Debiao
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2017, 73 : 22 - 31
  • [4] Identity-based encryption with equality test and datestamp-based authorization mechanism
    Lin, Xi-Jun
    Wang, Qihui
    Sun, Lin
    Qu, Haipeng
    Theoretical Computer Science, 2021, 861 : 117 - 132
  • [5] Efficient Equality Test on Identity-Based Ciphertexts Supporting Flexible Authorization
    Li, Na
    ENTROPY, 2023, 25 (02)
  • [6] Identity-based encryption with equality test and datestamp-based authorization mechanism
    Lin, Xi-Jun
    Wang, Qihui
    Sun, Lin
    Qu, Haipeng
    THEORETICAL COMPUTER SCIENCE, 2021, 861 : 117 - 132
  • [7] Accountable Privacy-Preserving Mechanism for Cloud Computing Based on Identity-Based Encryption
    Cheng, Hongbing
    Rong, Chunming
    Qian, Manyun
    Wang, Weihong
    IEEE ACCESS, 2018, 6 : 37869 - 37882
  • [8] Identity-Based Matchmaking Encryption with Equality Test
    Yan, Zhen
    Lin, Xijun
    Zhang, Xiaoshuai
    Xu, Jianliang
    Qu, Haipeng
    ENTROPY, 2024, 26 (01)
  • [9] Identity-Based Encryption with Outsourced Revocation in Cloud Computing
    Li, Jin
    Li, Jingwei
    Chen, Xiaofeng
    Jia, Chunfu
    Lou, Wenjing
    IEEE TRANSACTIONS ON COMPUTERS, 2015, 64 (02) : 425 - 437
  • [10] Public Key Encryption With Equality Test Supporting Flexible Designated Authorization in Cloud Storage
    Lin, Hao
    Gao, Fei
    Zhang, Hua
    Jin, Zhengping
    Li, Wenmin
    Wen, Qiaoyan
    IEEE SYSTEMS JOURNAL, 2022, 16 (01): : 1460 - 1470