Efficient Equality Test on Identity-Based Ciphertexts Supporting Flexible Authorization

被引:4
作者
Li, Na [1 ]
机构
[1] Beijing Univ Posts & Telecommun, State Key Lab Networking & Switching Technol, Beijing 100876, Peoples R China
基金
中国国家自然科学基金; 北京市自然科学基金;
关键词
equality test; trapdoor discrete log groups; identity-based encryption; cloud storage; PUBLIC-KEY ENCRYPTION;
D O I
10.3390/e25020362
中图分类号
O4 [物理学];
学科分类号
0702 ;
摘要
In the cloud, uploading encrypted data is the most effective way to ensure that the data are not leaked. However, data access control is still an open problem in cloud storage systems. To provide an authorization mechanism to limit the comparison of a user's ciphertexts with those of another, public key encryption supporting the equality test with four flexible authorizations (PKEET-FA) is presented. Subsequently, more functional identity-based encryption supporting the equality test (IBEET-FA) further combines identity-based encryption with flexible authorization. The bilinear pairing has always been intended to be replaced due to the high computational cost. Hence, in this paper, we use general trapdoor discrete log groups to construct a new and secure IBEET-FA scheme, which is more efficient. The computational cost for the encryption algorithm in our scheme was reduced to 43% of that of the scheme of Li et al. In Type 2 and 3 authorization algorithms, the computational cost of both was reduced to 40% of that of the scheme of Li et al. Furthermore, we give proof that our scheme is secure against one-wayness under the chosen identity and chosen ciphertext attacks (OW-ID-CCA), and indistinguishable against chosen identity and chosen ciphertext attacks (IND-ID-CCA).
引用
收藏
页数:17
相关论文
共 50 条
  • [31] SM9 Identity-Based Encryption Scheme with Equality Test and Cryptographic Reverse Firewalls
    Xiong H.
    Lin Y.
    Yao T.
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2024, 61 (04): : 1070 - 1084
  • [32] An authorized equality test on identity-based cryptosystem for mobile social networking applications
    Hassan, Abdelrhman
    Elhabob, Rashad
    Eltayieb, Nabeil
    Wang, Yong
    TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2021, 32 (12)
  • [33] Public key encryption supporting plaintext equality test and user-specified authorization
    Tang, Qiang
    SECURITY AND COMMUNICATION NETWORKS, 2012, 5 (12) : 1351 - 1362
  • [34] A Generic Construction of CCA-secure Identity-based Encryption with Equality Test against Insider Attacks
    Emura, Keita
    Takayasu, Atsushi
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2022, E105 (08)
  • [35] Certificateless Encryption Supporting Multi-Ciphertext Equality Test with Proxy-Assisted Authorization
    Dong, Siyue
    Zhao, Zhen
    Wang, Baocang
    Gao, Wen
    Zhang, Shanshan
    ELECTRONICS, 2023, 12 (20)
  • [36] Dual-Server Identity-Based Encryption with Authorized Equality Test for IoT Data in Clouds
    Zhao, Meng
    Ding, Yong
    SECURITY AND COMMUNICATION NETWORKS, 2022, 2022
  • [37] SM9 Identity-Based Encryption with Designated-Position Fuzzy Equality Test
    Dong, Siyue
    Zhao, Zhen
    Wang, Baocang
    Gao, Wen
    Zhang, Shanshan
    ELECTRONICS, 2024, 13 (07)
  • [38] Identity-based Encryption with Efficient Revocation
    Boldyreva, Alexandra
    Goyal, Vipul
    Kumar, Virendra
    CCS'08: PROCEEDINGS OF THE 15TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2008, : 417 - 426
  • [39] Efficient biometric identity-based encryption
    Li, Xiaoguo
    Xiang, Tao
    Chen, Fei
    Guo, Shangwei
    INFORMATION SCIENCES, 2018, 465 : 248 - 264
  • [40] Flexible Fine-Grained Authorization Public Key Encryption with Equality Test Under Standard Model
    Deng X.
    Qian H.
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2021, 58 (10): : 2222 - 2237