Identity-Based Encryption with Equality Test Supporting Accountable Authorization in Cloud Computing

被引:0
作者
Zhao, Zhen [1 ,2 ]
Wang, Bao-Cang [1 ]
Gao, Wen [3 ]
机构
[1] Xidian Univ, Sch Cyber Engn, Xian 710071, Peoples R China
[2] Henan Key Lab Network Cryptog Technol, Zhengzhou 453499, Peoples R China
[3] Xian Univ Posts & Telecommun, Sch Cyberspace Secur, Xian 710121, Peoples R China
基金
中国国家自然科学基金;
关键词
identity-based encryption with equality test; accountable authorization; cloud computing; Gentry's IBE; zero-knowledge proof; PUBLIC-KEY ENCRYPTION; GENERIC CONSTRUCTION; EFFICIENT; CIPHERTEXTS;
D O I
10.1007/s11390-024-2933-y
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Identity-based encryption with equality test (IBEET) is proposed to check whether the underlying messages of ciphertexts, even those encrypted with different public keys, are the same or not without decryption. Since people prefer to encrypt before outsourcing their data for privacy protection nowadays, the research of IBEET on cloud computing applications naturally attracts attention. However, we claim that the existing IBEET schemes suffer from the illegal trapdoor sharing problem caused by the inherited key escrow problem of the Identity-Based Encryption (IBE) mechanism. In traditional IBEET, the private key generator (PKG) with the master secret key generates trapdoors for all authorized cloud servers. Considering the reality in practice, the PKG is usually not fully trusted. In this case, the Private-Key Generator (PKG) may generate, share, or even sell any trapdoor without any risk of being caught, or not being held accountable, which may lead to serious consequences such as the illegal sharing of a gene bank's trapdoors. In this paper, to relieve the illegal trapdoor sharing problem in IBEET, we present a new notion, called IBEET Supporting Accountable Authorization (IBEET-AA). In IBEET-AA, if there is a disputed trapdoor, the generator will be distinguished among the PKG and suspected testers by an additional tracing algorithm. For the additional tracing function, except for the traditional indistinguishability (IND) and one-way (OW) security models in IBEET, we define three more security models to protect the tracing security against dishonest authorizers, PKG, and testers, respectively. Based on Gentry's IBE scheme, we instantiate IBEET-AA and give a specific construction along with a formalized security proof with random oracles.
引用
收藏
页码:215 / 228
页数:14
相关论文
共 50 条
[21]   A Generic Construction of CCA-Secure Identity-Based Encryption with Equality Test against Insider Attacks [J].
Emura, Keita ;
Takayasu, Atsushi .
IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2023, E106A (03) :193-202
[22]   Attribute-Hiding Predicate Encryption With Equality Test in Cloud Computing [J].
Sun, Jianfei ;
Bao, Yangyang ;
Nie, Xuyun ;
Xiong, Hu .
IEEE ACCESS, 2018, 6 :31621-31629
[23]   Identity-based encryption with authorized equivalence test for cloud-assisted IoT [J].
Elhabob, Rashad ;
Zhao, Yanan ;
Eltayieb, Nabeil ;
Abdelgader, Abdeldime M. S. ;
Xiong, Hu .
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2020, 23 (02) :1085-1101
[24]   Semi-generic construction of public key encryption and identity-based encryption with equality test [J].
Lee, Hyung Tae ;
Ling, San ;
Seo, Jae Hong ;
Wang, Huaxiong .
INFORMATION SCIENCES, 2016, 373 :419-440
[25]   Controllable forward secure identity-based encryption with equality test in privacy-preserving text similarity analysis [J].
Ma, Sha ;
Ye, Zhiqing ;
Huang, Qiong ;
Jiang, Chengyu .
INFORMATION SCIENCES, 2024, 660
[26]   Equality Test on Identity-Based Encryption With Cryptographic Reverse Firewalls for Telemedicine Systems [J].
Elhabob, Rashad ;
Eltayieb, Nabeil ;
Xiong, Hu ;
Kumari, Saru .
IEEE INTERNET OF THINGS JOURNAL, 2025, 12 (02) :2106-2121
[27]   Cryptanalysis of Zhu et al.'s Identity-Based Encryption With Equality Test Without Random Oracles [J].
Lee, Hyung Tae .
IEEE ACCESS, 2023, 11 :84533-84542
[28]   Public-Key Encryption With Tester Verifiable Equality Test for Cloud Computing [J].
Zhao, Zhen ;
Susilo, Willy ;
Wang, Baocang ;
Zeng, Kai .
IEEE TRANSACTIONS ON CLOUD COMPUTING, 2023, 11 (04) :3396-3406
[29]   Pairing-Free Identity-Based Encryption with Authorized Equality Test in Online Social Networks [J].
Wu, Libing ;
Zhang, Yubo ;
Choo, Kim-Kwang Raymond ;
He, Debiao .
INTERNATIONAL JOURNAL OF FOUNDATIONS OF COMPUTER SCIENCE, 2019, 30 (04) :647-664
[30]   An Accountable Identity-based Billing Protocol for Cloud Environment [J].
Lo, Nai-Wei ;
Liu, Cheng Tsung .
2015 INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING (IIH-MSP), 2015, :223-226