Revocable Certificateless Public Key Encryption with Equality Test

被引:4
|
作者
Tsai, Tung-Tso [1 ]
Lin, Han-Yu [1 ]
Tsai, Han-Ching [1 ]
机构
[1] Natl Taiwan Ocean Univ, Dept Comp Sci & Engn, Keelung 202, Taiwan
来源
INFORMATION TECHNOLOGY AND CONTROL | 2022年 / 51卷 / 04期
关键词
Revocable; certificateless; equality test; public key encryption; bilinear pairing; IDENTITY-BASED ENCRYPTION; ID-BASED SIGNATURE; BROADCAST ENCRYPTION; KEYWORD SEARCH; SCHEME; AUTHENTICATION;
D O I
10.5755/j01.itc.51.4.30691
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Traditional public key cryptography requires certificates as a link between each user's identity and her/his public key. Typically, public key infrastructures (PKI) are used to manage and maintain certificates. However, it takes a lot of resources to build PKI which includes many roles and complex policies. The concept of certificateless public key encryption (CL-PKC) was introduced to eliminate the need for certificates. Based on this concept, a mechanism called certificateless public key encryption with equality test (CL-PKEET) was proposed to ensure the confidentiality of private data and provide an equality test of different ciphertexts. The mechanism is suitable for cloud applications where users cannot only protect personal private data but also enjoy cloud services which test the equality of different ciphertexts. More specifically, any two ciphertexts can be tested to determine whether they are encrypted from the same plaintext. Indeed, any practical system needs to provide a solution to revoke compromised users. However, these existing CL-PKEET schemes do not address the revocation problem, and the related research is scant. Therefore, the aim of this article is to propose the first revocable CL-PKEET scheme called RCL-PKEET which can effectively remove illegal users from the system while maintaining the effectiveness of existing CL-PKEET schemes in encryption, decryption, and equality testing processes. Additionally, we formally demonstrate the security of the proposed scheme under the bilinear Diffie-Hellman assumption.
引用
收藏
页码:638 / 660
页数:23
相关论文
共 50 条
  • [31] Certificateless Public Key Encryption with Keyword Search
    Peng Yanguo
    Cui Jiangtao
    Peng Changgen
    Ying Zuobin
    CHINA COMMUNICATIONS, 2014, 11 (11) : 100 - 113
  • [32] Further Observations on Certificateless Public Key Encryption
    Wang, Xu an
    Huang, Xinyi
    Yang, Xiaoyuan
    INFORMATION SECURITY AND CRYPTOLOGY, 2009, 5487 : 217 - 239
  • [33] Certificateless public key encryption without pairing
    Baek, J
    Safavi-Naini, R
    Susilo, W
    INFORMATION SECURITY, PROCEEDINGS, 2005, 3650 : 134 - 148
  • [34] A revocable certificateless encryption scheme with high performance
    Yinxia S.
    Zhuoran Z.
    Limin S.
    International Journal of High Performance Computing and Networking, 2018, 11 (01): : 83 - 91
  • [35] Efficient public key encryption with revocable keyword search
    Yu, Yong
    Ni, Jianbing
    Yang, Haomiao
    Mu, Yi
    Susilo, Willy
    SECURITY AND COMMUNICATION NETWORKS, 2014, 7 (02) : 466 - 472
  • [36] Revocable Public Key Encryption with Authorized Keyword Search
    Xu, Wujing
    Dong, Xiaolei
    Cao, Zhenfu
    Shen, Jiachen
    PROCEEDINGS OF 2019 IEEE 3RD INFORMATION TECHNOLOGY, NETWORKING, ELECTRONIC AND AUTOMATION CONTROL CONFERENCE (ITNEC 2019), 2019, : 857 - 860
  • [37] Group ID Authorized -Based Certificateless Encryption with Equality Test
    Bai Qiaoling
    Niu Shufen
    2020 5TH INTERNATIONAL CONFERENCE ON MECHANICAL, CONTROL AND COMPUTER ENGINEERING (ICMCCE 2020), 2020, : 2154 - 2157
  • [38] Stateful Certificateless Public Key Encryption with Application in Public Cloud
    Vivek, S. Sree
    INNOVATIVE SECURITY SOLUTIONS FOR INFORMATION TECHNOLOGY AND COMMUNICATIONS, 2015, 9522 : 130 - 149
  • [39] PKE-AET: Public Key Encryption with Authorized Equality Test
    Huang, Kaibin
    Tso, Raylin
    Chen, Yu-Chi
    Rahman, Sk Md Mizanur
    Almogren, Ahmad
    Alamri, Atif
    COMPUTER JOURNAL, 2015, 58 (10): : 2686 - 2697
  • [40] Efficient public-key encryption with equality test from lattices
    Li, Qinyi
    Boyen, Xavier
    THEORETICAL COMPUTER SCIENCE, 2021, 892 : 85 - 107