Revocable Public Key Encryption with Equality Test without Pairing in Cloud Storage

被引:2
|
作者
Yang, Tian [1 ]
Ma, Sha [1 ]
Du, Jiaojiao [1 ]
Jiang, Chengyu [1 ]
Huang, Qiong [1 ]
机构
[1] South China Agr Univ, Coll Math & Informat, Guangzhou 510642, Peoples R China
来源
COMPUTER JOURNAL | 2024年 / 67卷 / 02期
基金
中国国家自然科学基金;
关键词
cloud storage; public key encryption; equality test; revocation; IDENTITY-BASED ENCRYPTION; SEARCHABLE ENCRYPTION; GENERIC CONSTRUCTION; KEYWORD SEARCH; AUTHORIZATION; SIGNCRYPTION; SCHEME;
D O I
10.1093/comjnl/bxad006
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Public key encryption with equality test (PKEET) plays an important role in the cloud storage. It allows a third party to test whether two ciphertexts contain the same message without decryption. Since the third party is not fully trusted, it is sometimes necessary to prevent the third party from testing the ciphertexts all the time. To this end, we propose the notion of revocable public key encryption with equality test (R-PKEET). We give the construction of R-PKEET in the random oracle model, which employs time key to update trapdoor and partial ciphertexts. In details, our scheme enables a user to revoke the third party's test right by sending a time key to the cloud server, which is responsible for updating partial ciphertexts using the time key. Compared with related works, our scheme achieves both lightweight revocation and lower computational complexity by using Shamir's secret sharing and Lagrange interpolating polynomial.
引用
收藏
页码:642 / 657
页数:16
相关论文
共 50 条
  • [21] Secure Data Integrity Check Based on Verified Public Key Encryption With Equality Test for Multi-Cloud Storage
    Li, Wenchao
    Susilo, Willy
    Xia, Chunhe
    Huang, Luqi
    Guo, Fuchun
    Wang, Tianbo
    IEEE Transactions on Dependable and Secure Computing, 2024, 21 (06) : 5359 - 5373
  • [22] Traceable Scheme of Public Key Encryption with Equality Test
    Zhu, Huijun
    Xue, Qingji
    Li, Tianfeng
    Xie, Dong
    ENTROPY, 2022, 24 (03)
  • [23] Public key encryption with equality test in the standard model
    Lee, Hyung Tae
    Ling, San
    Seo, Jae Hong
    Wang, Huaxiong
    Youn, Taek-Young
    INFORMATION SCIENCES, 2020, 516 : 89 - 108
  • [24] A Multivariate Public Key Encryption Scheme With Equality Test
    Shen, Xiaoying
    Wang, Licheng
    Zhu, Huijun
    Liu, Yuan
    IEEE ACCESS, 2020, 8 : 75463 - 75472
  • [25] Public key encryption with filtered equality test revisited
    Chen, Yu-Chi
    Xie, Xin
    Tsao, Hung-Yu
    Tso, Raylin
    DESIGNS CODES AND CRYPTOGRAPHY, 2021, 89 (10) : 2357 - 2372
  • [26] Public key encryption with filtered equality test revisited
    Yu-Chi Chen
    Xin Xie
    Hung-Yu Tsao
    Raylin Tso
    Designs, Codes and Cryptography, 2021, 89 : 2357 - 2372
  • [27] Public key encryption supporting equality test and flexible authorization without bilinear pairings
    Lin, Xi-Jun
    Sun, Lin
    Qu, Haipeng
    Zhang, Xiaoshuai
    COMPUTER COMMUNICATIONS, 2021, 170 : 190 - 199
  • [28] Efficient Public Key Encryption With Outsourced Equality Test for Cloud-Based IoT Environments
    Ma, Sha
    Zhong, Yijian
    Huang, Qiong
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2022, 17 : 3758 - 3772
  • [29] Efficient Public Key Encryption With Outsourced Equality Test for Cloud-Based IoT Environments
    Ma, Sha
    Zhong, Yijian
    Huang, Qiong
    IEEE Transactions on Information Forensics and Security, 2022, 17 : 3758 - 3772
  • [30] New certificateless public key encryption scheme without pairing
    Yan, Xiaopeng
    Gong, Peng
    Bai, Zhiquan
    Wang, Jiantao
    Li, Ping
    IET INFORMATION SECURITY, 2013, 7 (04) : 271 - 276