Efficient Identity-Based Encryption Scheme with Equality Test in Smart City

被引:26
|
作者
Wu, Libing [1 ]
Zhang, Yubo [1 ]
Choo, Kim-Kwang Raymond [2 ]
He, Debiao [3 ,4 ]
机构
[1] Wuhan Univ, Sch Comp Sci, Wuhan 430072, Hubei, Peoples R China
[2] Univ Texas San Antonio, Dept Informat Syst & Cyber Secur, San Antonio, TX 78229 USA
[3] Wuhan Univ, Sch Comp Sci, State Key Lab Software Engn, Wuhan 430072, Hubei, Peoples R China
[4] Guilin Univ Elect Technol, Guangxi Key Lab Cryptog & Informat Secur, Guilin 541004, Guangxi, Peoples R China
来源
基金
中国国家自然科学基金;
关键词
Smart grid; equality test; identity-based; encryption scheme; cloud to edge;
D O I
10.1109/TSUSC.2017.2734110
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
To support a sustainable development of smart city, smart grid is an indispensable part. Sensor technology in smart gird enables interactive real-time data transmission between cloud and the edge of the network. There are a number of research challenges in the design of smart grids. One of these research challenges is balancing customer privacy and the cloud-based power system's function optimization. Identity-based encryption with equality test (IBEET) scheme has recently been identified as a viable solution, in which customers can delegate a trapdoor to the power system control server and the server then searches on the encrypted data to determine whether two different ciphertexts are encryptions of the same plaintext. Unfortunately, existing schemes are inefficient and the trapdoor could be used to perform equality test on any message; thus, leakage of privacy. In this paper, we propose an efficient IBEET scheme with bilinear pairing, which reduces the need for time-consuming HashToPoint function and each trapdoor could only be used to perform the equality test on a particular keyword. We then prove the security of our scheme for one-way chosen-ciphertext security against a chosen identity (OW-ID-CCA) attack in the random oracle model (ROM). The performance evaluation of our scheme demonstrates that in comparison to the scheme of Ma (2016), our scheme achieves a reduction of 36.7 and 39.24 percent in computation costs during the encryption phase and test phase, respectively.
引用
收藏
页码:44 / 55
页数:12
相关论文
共 50 条
  • [1] Identity-Based Encryption with Filtered Equality Test for Smart City Applications
    Ming, Yang
    Wang, Erxiu
    SENSORS, 2019, 19 (14)
  • [2] Efficient and secure identity-based encryption scheme with equality test in cloud computing
    Wu, Libing
    Zhang, Yubo
    Choo, Kim-Kwang Raymond
    He, Debiao
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2017, 73 : 22 - 31
  • [3] Cryptanalysis of an Identity-Based Encryption Scheme With Equality Test and Improvement
    Liao, Yongjian
    Fan, Yu
    Liang, Yikuan
    Liu, Yulu
    Mohammed, Ramadan
    IEEE ACCESS, 2019, 7 : 75067 - 75072
  • [4] An Efficient Identity-Based Encryption With Equality Test in Cloud Computing
    Yang, Zhichao
    He, Debiao
    Qu, Longjiang
    Ye, Qing
    IEEE TRANSACTIONS ON CLOUD COMPUTING, 2023, 11 (03) : 2983 - 2992
  • [5] An Identity-Based Encryption with Equality Test scheme for healthcare social apps
    Lu, Jingwei
    Li, Hongbo
    Huang, Jianye
    Ma, Sha
    Au, Man Ho Allen
    Huang, Qiong
    COMPUTER STANDARDS & INTERFACES, 2024, 87
  • [6] An Efficient Revocable Identity-Based Encryption with Equality Test Scheme for the Wireless Body Area Network
    Tsai, Tung-Tso
    Lin, Han-Yu
    Chang, Hsiao-Chieh
    JOURNAL OF SENSORS, 2022, 2022
  • [7] Identity-Based Matchmaking Encryption with Equality Test
    Yan, Zhen
    Lin, Xijun
    Zhang, Xiaoshuai
    Xu, Jianliang
    Qu, Haipeng
    ENTROPY, 2024, 26 (01)
  • [8] Efficient Post-quantum Identity-based Encryption with Equality Test
    Susilo, Willy
    Dung Hoang Duong
    Huy Quoc Le
    2020 IEEE 26TH INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED SYSTEMS (ICPADS), 2020, : 633 - 640
  • [9] Identity-based encryption with outsourced equality test in cloud computing
    Ma, Sha
    INFORMATION SCIENCES, 2016, 328 : 389 - 402
  • [10] An Efficient Identity-Based Deniable Authenticated Encryption Scheme
    Wu, Weifeng
    Li, Fagen
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2015, 9 (05): : 1904 - 1919