Identity-Based Encryption with Filtered Equality Test for Smart City Applications

被引:19
|
作者
Ming, Yang [1 ]
Wang, Erxiu [1 ]
机构
[1] Changan Univ, Sch Informat Engn, Xian 710064, Shaanxi, Peoples R China
关键词
smart healthcare; identity-based encryption; filtered equality test; random oracle model; PUBLIC-KEY ENCRYPTION; KEYWORD GUESSING ATTACKS; ACCESS-CONTROL; SECURE; HEALTH; EFFICIENT; INTERNET;
D O I
10.3390/s19143046
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
With the growth of the urban population, the rapid development of smart cities has become the focus of urban regional development. Smart medical care is an indispensable part of smart city construction, which promotes the development of the medical industry. However, the security of data and timely service are the current problems faced by intelligent medical systems. Based on the public key encryption with filtered equality test and identity-based cryptography, an identity-based encryption with the filtered equality test (IBE-FET) is proposed for smart healthcare, in which a data receiver can use the private key and the message set to generate a warrant and send it to the cloud server. A cloud server can verify the equality between ciphertexts without decryption and check whether the encrypted message belongs to the same message set. Furthermore, the security analysis shows that the proposed scheme satisfies one-way security against the chosen identity and ciphertext attack in the random oracle model under the computational bilinear Diffie-Hellman assumption. The performance comparison shows that the scheme is feasible and practical in real life.
引用
收藏
页数:22
相关论文
共 50 条
  • [41] TLS PROTOCOL EXTENSIONS FOR WEB APPLICATIONS OF IDENTITY-BASED ENCRYPTION
    Sun, Tao
    Hu, Liang
    Cheng, Xiao-Chun
    Liu, Zhe-Li
    PROCEEDINGS OF 2009 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-6, 2009, : 3595 - +
  • [42] Public key encryption with filtered equality test revisited
    Chen, Yu-Chi
    Xie, Xin
    Tsao, Hung-Yu
    Tso, Raylin
    DESIGNS CODES AND CRYPTOGRAPHY, 2021, 89 (10) : 2357 - 2372
  • [43] On the Relation between Identity-Based Proxy Re-Encryption and Mediated Identity-Based Encryption
    Wan, Zhong-Mei
    Weng, Jian
    Lai, Xue-Jia
    Liu, Sheng-Li
    Li, Ji-Guo
    JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2011, 27 (01) : 243 - 259
  • [44] A MULTIVARIATE IDENTITY-BASED BROADCAST ENCRYPTION WITH APPLICATIONS TO THE INTERNET OF THINGS
    Srivastava, Vikas
    Debnath, Sumit Kumar
    Stanica, Pantelimon
    Pal, Saibal Kumar
    ADVANCES IN MATHEMATICS OF COMMUNICATIONS, 2023, 17 (06) : 1302 - 1313
  • [45] Identity-Based Authenticated Encryption with Identity Confidentiality
    Zhao, Yunlei
    COMPUTER SECURITY - ESORICS 2020, PT II, 2020, 12309 : 633 - 653
  • [46] Anonymous Identity-Based Encryption with Identity Recovery
    Ma, Xuecheng
    Wang, Xin
    Lin, Dongdai
    INFORMATION SECURITY AND PRIVACY, 2018, 10946 : 360 - 375
  • [47] Identity-based authenticated encryption with identity confidentiality
    Shen, Shiyu
    Wang, Hongbing
    Zhao, Yunlei
    THEORETICAL COMPUTER SCIENCE, 2022, 901 : 1 - 18
  • [48] Constructing Forward-Secure Identity-Based Encryption from Identity-Based Binary Tree Encryption
    Lu, Yang
    Li, Jiguo
    2012 INTERNATIONAL SYMPOSIUM ON INFORMATION SCIENCE AND ENGINEERING (ISISE), 2012, : 199 - 202
  • [49] Efficient Equality Test on Identity-Based Ciphertexts Supporting Flexible Authorization
    Li, Na
    ENTROPY, 2023, 25 (02)
  • [50] Backward Compatible Identity-Based Encryption
    Kim, Jongkil
    SENSORS, 2023, 23 (09)