Revocable Certificateless Public Key Encryption with Equality Test

被引:4
|
作者
Tsai, Tung-Tso [1 ]
Lin, Han-Yu [1 ]
Tsai, Han-Ching [1 ]
机构
[1] Natl Taiwan Ocean Univ, Dept Comp Sci & Engn, Keelung 202, Taiwan
来源
INFORMATION TECHNOLOGY AND CONTROL | 2022年 / 51卷 / 04期
关键词
Revocable; certificateless; equality test; public key encryption; bilinear pairing; IDENTITY-BASED ENCRYPTION; ID-BASED SIGNATURE; BROADCAST ENCRYPTION; KEYWORD SEARCH; SCHEME; AUTHENTICATION;
D O I
10.5755/j01.itc.51.4.30691
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Traditional public key cryptography requires certificates as a link between each user's identity and her/his public key. Typically, public key infrastructures (PKI) are used to manage and maintain certificates. However, it takes a lot of resources to build PKI which includes many roles and complex policies. The concept of certificateless public key encryption (CL-PKC) was introduced to eliminate the need for certificates. Based on this concept, a mechanism called certificateless public key encryption with equality test (CL-PKEET) was proposed to ensure the confidentiality of private data and provide an equality test of different ciphertexts. The mechanism is suitable for cloud applications where users cannot only protect personal private data but also enjoy cloud services which test the equality of different ciphertexts. More specifically, any two ciphertexts can be tested to determine whether they are encrypted from the same plaintext. Indeed, any practical system needs to provide a solution to revoke compromised users. However, these existing CL-PKEET schemes do not address the revocation problem, and the related research is scant. Therefore, the aim of this article is to propose the first revocable CL-PKEET scheme called RCL-PKEET which can effectively remove illegal users from the system while maintaining the effectiveness of existing CL-PKEET schemes in encryption, decryption, and equality testing processes. Additionally, we formally demonstrate the security of the proposed scheme under the bilinear Diffie-Hellman assumption.
引用
收藏
页码:638 / 660
页数:23
相关论文
共 50 条
  • [21] Efficient Certificateless Public Key Cryptography With Equality Test for Internet of Vehicles
    Elhabob, Rashad
    Zhao, Yanan
    Sella, Iva
    Xiong, Hu
    IEEE ACCESS, 2019, 7 : 68957 - 68969
  • [22] An efficient certificateless public key cryptography with authorized equality test in IIoT
    Rashad Elhabob
    Yanan Zhao
    Iva Sella
    Hu Xiong
    Journal of Ambient Intelligence and Humanized Computing, 2020, 11 : 1065 - 1083
  • [23] An efficient certificateless public key cryptography with authorized equality test in IIoT
    Elhabob, Rashad
    Zhao, Yanan
    Sella, Iva
    Xiong, Hu
    JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2020, 11 (03) : 1065 - 1083
  • [24] Revocable Certificateless Encryption with Ciphertext Evolution
    Sun, Yinxia
    Zhang, Futai
    Fu, Anmin
    INFORMATION SECURITY AND PRIVACY, 2018, 10946 : 741 - 749
  • [25] Group Public Key Encryption With Equality Test for Dynamic Membership
    Xiang, Ru
    Ma, Sha
    Liu, Xinjie
    2021 IEEE 9TH INTERNATIONAL CONFERENCE ON INFORMATION, COMMUNICATION AND NETWORKS (ICICN 2021), 2021, : 351 - 356
  • [26] SECURITY ANALYSIS OF PUBLIC KEY ENCRYPTION WITH FILTERED EQUALITY TEST
    Chen, Yu-Chi
    ADVANCES IN MATHEMATICS OF COMMUNICATIONS, 2023, 17 (06) : 1358 - 1363
  • [27] A Certificateless Threshold Public Key Encryption Scheme
    ZOU Xiubin1
    2.College of Computer and Mathematics
    3.Ira A.Fulton Schools of Engineering
    Wuhan University Journal of Natural Sciences, 2012, 17 (03) : 223 - 228
  • [29] Efficient public key encryption with equality test in the standard model
    Zhang, Kai
    Chen, Jie
    Lee, Hyung Tae
    Qian, Haifeng
    Wang, Huaxiong
    THEORETICAL COMPUTER SCIENCE, 2019, 755 : 65 - 80
  • [30] Certificateless Public Key Encryption Made Practical
    Viet Cuong Trinh
    2017 4TH NAFOSTED CONFERENCE ON INFORMATION AND COMPUTER SCIENCE (NICS), 2017, : 54 - 59