Efficient Equality Test on Identity-Based Ciphertexts Supporting Flexible Authorization

被引:3
|
作者
Li, Na [1 ]
机构
[1] Beijing Univ Posts & Telecommun, State Key Lab Networking & Switching Technol, Beijing 100876, Peoples R China
基金
中国国家自然科学基金; 北京市自然科学基金;
关键词
equality test; trapdoor discrete log groups; identity-based encryption; cloud storage; PUBLIC-KEY ENCRYPTION;
D O I
10.3390/e25020362
中图分类号
O4 [物理学];
学科分类号
0702 ;
摘要
In the cloud, uploading encrypted data is the most effective way to ensure that the data are not leaked. However, data access control is still an open problem in cloud storage systems. To provide an authorization mechanism to limit the comparison of a user's ciphertexts with those of another, public key encryption supporting the equality test with four flexible authorizations (PKEET-FA) is presented. Subsequently, more functional identity-based encryption supporting the equality test (IBEET-FA) further combines identity-based encryption with flexible authorization. The bilinear pairing has always been intended to be replaced due to the high computational cost. Hence, in this paper, we use general trapdoor discrete log groups to construct a new and secure IBEET-FA scheme, which is more efficient. The computational cost for the encryption algorithm in our scheme was reduced to 43% of that of the scheme of Li et al. In Type 2 and 3 authorization algorithms, the computational cost of both was reduced to 40% of that of the scheme of Li et al. Furthermore, we give proof that our scheme is secure against one-wayness under the chosen identity and chosen ciphertext attacks (OW-ID-CCA), and indistinguishable against chosen identity and chosen ciphertext attacks (IND-ID-CCA).
引用
收藏
页数:17
相关论文
共 50 条
  • [21] Anonymous Hierarchical Identity-Based Encryption with Constant Size Ciphertexts
    Seo, Jae Hong
    Kobayashi, Tetsutaro
    Ohkubo, Miyako
    Suzuki, Koutarou
    PUBLIC KEY CRYPTOGRAPHY-PKC 2009, PROCEEDINGS, 2009, 5443 : 215 - +
  • [22] On the Feasibility of Identity-Based Encryption with Equality Test Against Insider Attacks
    Emura, Keita
    INFORMATION SECURITY AND PRIVACY, PT I, ACISP 2024, 2024, 14895 : 261 - 280
  • [23] Identity-Based Encryption with Filtered Equality Test for Smart City Applications
    Ming, Yang
    Wang, Erxiu
    SENSORS, 2019, 19 (14)
  • [24] An Identity-Based Encryption with Equality Test scheme for healthcare social apps
    Lu, Jingwei
    Li, Hongbo
    Huang, Jianye
    Ma, Sha
    Au, Man Ho Allen
    Huang, Qiong
    COMPUTER STANDARDS & INTERFACES, 2024, 87
  • [25] New identity-based broadcast encryption with constant ciphertexts in the standard model
    Wu Q.
    Wang W.
    Journal of Software, 2011, 6 (10) : 1929 - 1936
  • [26] Identity-based broadcast encryption with constant size ciphertexts and private keys
    Delerablee, Cecile
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2007, 2007, 4833 : 200 - 215
  • [27] An authorized equality test on identity-based cryptosystem for mobile social networking applications
    Hassan, Abdelrhman
    Elhabob, Rashad
    Eltayieb, Nabeil
    Wang, Yong
    TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2021, 32 (12)
  • [28] Secure Equality Test Technique Using Identity-Based Signcryption for Telemedicine Systems
    Ramadan, Mohammed
    Raza, Shahid
    IEEE INTERNET OF THINGS JOURNAL, 2023, 10 (18) : 16594 - 16604
  • [29] New Fully Secure Hierarchical Identity-Based Encryption with Constant Size Ciphertexts
    Luo, Song
    Chen, Yu
    Hu, Jianbin
    Chen, Zhong
    INFORMATION SECURITY PRACTICE AND EXPERIENCE, 2011, 6672 : 55 - 70
  • [30] Generic construction of public key encryption, identity-based encryption and signcryption with equality test
    Lin, Xi-Jun
    Sun, Lin
    Qu, Haipeng
    INFORMATION SCIENCES, 2018, 453 : 111 - 126