Identity-Based Encryption with Equality Test Supporting Accountable Authorization in Cloud Computing

被引:0
|
作者
机构
[1] Xidian University,School of Cyber Engineering
[2] Henan Key Laboratory of Network Cryptography Technology,School of Cyberspace Security
[3] Xi’an University of Posts and Telecommunications,undefined
关键词
identity-based encryption with equality test; accountable authorization; cloud computing; Gentry’s IBE; zero-knowledge proof;
D O I
10.1007/s11390-024-2933-y
中图分类号
学科分类号
摘要
Identity-based encryption with equality test (IBEET) is proposed to check whether the underlying messages of ciphertexts, even those encrypted with different public keys, are the same or not without decryption. Since people prefer to encrypt before outsourcing their data for privacy protection nowadays, the research of IBEET on cloud computing applications naturally attracts attention. However, we claim that the existing IBEET schemes suffer from the illegal trapdoor sharing problem caused by the inherited key escrow problem of the Identity-Based Encryption (IBE) mechanism. In traditional IBEET, the private key generator (PKG) with the master secret key generates trapdoors for all authorized cloud servers. Considering the reality in practice, the PKG is usually not fully trusted. In this case, the Private-Key Generator (PKG) may generate, share, or even sell any trapdoor without any risk of being caught, or not being held accountable, which may lead to serious consequences such as the illegal sharing of a gene bank’s trapdoors. In this paper, to relieve the illegal trapdoor sharing problem in IBEET, we present a new notion, called IBEET Supporting Accountable Authorization (IBEET-AA). In IBEET-AA, if there is a disputed trapdoor, the generator will be distinguished among the PKG and suspected testers by an additional tracing algorithm. For the additional tracing function, except for the traditional indistinguishability (IND) and one-way (OW) security models in IBEET, we define three more security models to protect the tracing security against dishonest authorizers, PKG, and testers, respectively. Based on Gentry’s IBE scheme, we instantiate IBEET-AA and give a specific construction along with a formalized security proof with random oracles.
引用
收藏
页码:215 / 228
页数:13
相关论文
共 50 条
  • [31] Identity-Based Authentication for Cloud Computing
    Li, Hongwei
    Dai, Yuanshun
    Tian, Ling
    Yang, Haomiao
    CLOUD COMPUTING, PROCEEDINGS, 2009, 5931 : 157 - 166
  • [32] Identity-based public key cryptographic primitive with delegated equality test against insider attack in cloud computing
    Alornyo, Seth
    Mensah, Acheampong Edward
    Abbam, Abraham Opanfo
    International Journal of Network Security, 2020, 22 (05) : 743 - 751
  • [33] Identity-based encryption and hierarchical identity-based encryption
    University of Waterloo, Canada
    不详
    Cryptology Inf. Secur. Ser., 2009, (45-64):
  • [34] Identity based encryption with equality test
    Batamuliza, Jennifer
    Hanyurwimfura, Damien
    INFORMATION SECURITY JOURNAL, 2021, 30 (02): : 111 - 124
  • [35] Identity-based encryption with authorized equivalence test for cloud-assisted IoT
    Elhabob, Rashad
    Zhao, Yanan
    Eltayieb, Nabeil
    Abdelgader, Abdeldime M. S.
    Xiong, Hu
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2020, 23 (02): : 1085 - 1101
  • [36] Identity-based encryption with authorized equivalence test for cloud-assisted IoT
    Rashad Elhabob
    Yanan Zhao
    Nabeil Eltayieb
    Abdeldime M. S. Abdelgader
    Hu Xiong
    Cluster Computing, 2020, 23 : 1085 - 1101
  • [37] Full black-box retrievable and accountable identity-based encryption
    Zhao, Zhen
    Susilo, Willy
    Guo, Fuchun
    Lai, Jianchang
    Wang, Baocang
    COMPUTER STANDARDS & INTERFACES, 2023, 86
  • [38] Identity-Based Proxy Re-encryption over NTRU Lattices for Cloud Computing
    Yue, Na
    Wang, Yang
    Wang, Mingqiang
    2020 INTERNATIONAL CONFERENCE ON IDENTIFICATION, INFORMATION AND KNOWLEDGE IN THE INTERNET OF THINGS (IIKI2020), 2021, 187 : 264 - 269
  • [39] An Identity-Based Authentication Scheme in Cloud Computing
    Zhang, Zhi-Hua
    Jiang Xue-Feng
    Li, Jian-Jun
    Jiang, Wei
    2012 INTERNATIONAL CONFERENCE ON INDUSTRIAL CONTROL AND ELECTRONICS ENGINEERING (ICICEE), 2012, : 984 - 986
  • [40] Identity-based key management for cloud computing
    Zhu, Hong
    Mei, Zhuolin
    Xie, Meiyi
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (13) : 2143 - 2156