Privacy-Preserving and Traceable Functional Encryption for Inner Product in Cloud Computing

被引:0
作者
Qiu, Muyao [1 ]
Han, Jinguang [1 ,2 ]
Hao, Feng [3 ]
Sun, Chao [1 ]
Wu, Ge [1 ]
机构
[1] Southeast Univ, Sch Cyber Sci & Engn, Nanjing 210096, Peoples R China
[2] Southeast Univ, Engn Res Ctr Blockchain Applicat Supervis & Manage, Minister Educ, Nanjing 210096, Peoples R China
[3] Univ Warwick, Dept Comp Sci, Coventry CV4 7AL, England
基金
中国国家自然科学基金;
关键词
Encryption; Cloud computing; Public key; IP networks; Vectors; Closed box; Iron; Flight recording; Electronic equipment; Functional encryption; inner production; traceability; privacy; security; ATTRIBUTE-BASED ENCRYPTION; CP-ABE; SIGNATURES;
D O I
10.1109/TCC.2025.3556925
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud computing is a distributed infrastructure that centralizes server resources on a platform in order to provide services over the internet. Traditional public-key encryption protects data confidentiality in cloud computing, while functional encryption provides a more fine-grained decryption method, which only reveals a function of the encrypted data. However, functional encryption in cloud computing faces the problem of key sharing. In order to trace malicious users who share keys with others, traceable FE-IP (TFE-IP) schemes were proposed where the key generation center (KGC) knows users' identities and binds them with different secret keys. Nevertheless, existing schemes fail to protect the privacy of users' identities. The fundamental challenge to construct a privacy-preserving TFE-IP scheme is that KGC needs to bind a key with a user's identity without knowing the identity. To balance privacy and accountability in cloud computing, we propose the concept of privacy-preserving traceable functional encryption for inner product (PPTFE-IP) and give a concrete construction which offers the features: (1) To prevent key sharing, both a user's identity and a vector are bound together in the key; (2) The KGC and a user execute a two-party secure computing protocol to generate a key without the former knowing anything about the latter's identity; (3) Each user can ensure the integrity and correctness of his/her key through verification; (4) The inner product of the two vectors embedded in a ciphertext and in his/her key can be calculated by an authorized user; (5) Only the tracer can trace the identity embedded in a key. We formally reduce the security of the proposed PPTFE-IP to well-known complexity assumptions, and conduct an implementation to evaluate its efficiency. The novelty of our scheme is to protect the user's privacy and provide traceability if required.
引用
收藏
页码:667 / 679
页数:13
相关论文
共 43 条
[1]  
Abdalla M., 2016, Cryptol. ePrint Arch.
[2]  
Abdalla M, 2019, LECT NOTES COMPUT SC, V11443, P128, DOI 10.1007/978-3-030-17259-6_5
[3]   Simple Functional Encryption Schemes for Inner Products [J].
Abdalla, Michel ;
Bourse, Florian ;
De Caro, Angelo ;
Pointcheval, David .
PUBLIC-KEY CRYPTOGRAPHY - PKC 2015, 2015, 9020 :733-751
[4]   Fully Secure Functional Encryption for Inner Products, from Standard Assumptions [J].
Agrawal, Shweta ;
Libert, Benoit ;
Stehle, Damien .
ADVANCES IN CRYPTOLOGY (CRYPTO 2016), PT III, 2016, 9816 :333-362
[5]  
[Anonymous], 2006, The pairing-based cryptography library
[6]   A View of Cloud Computing [J].
Armbrust, Michael ;
Fox, Armando ;
Griffith, Rean ;
Joseph, Anthony D. ;
Katz, Randy ;
Konwinski, Andy ;
Lee, Gunho ;
Patterson, David ;
Rabkin, Ariel ;
Stoica, Ion ;
Zaharia, Matei .
COMMUNICATIONS OF THE ACM, 2010, 53 (04) :50-58
[7]  
Bharati P. Vijaya, 2016, Emerg. Res. Comput., Inf., Commun. Appl., P201
[8]  
Boneh D, 2004, LECT NOTES COMPUT SC, V3027, P56
[9]  
Boneh D., 1999, ADV CRYPTOLOGY CRYPT, V1666, P338, DOI [DOI 10.1007/3-540-48405-1, 10.1007/3-540-48405-1_22, DOI 10.1007/3-540-48405-1_22]
[10]  
Boneh D, 2011, LECT NOTES COMPUT SC, V6597, P253, DOI 10.1007/978-3-642-19571-6_16