Efficient Equality Test on Identity-Based Ciphertexts Supporting Flexible Authorization

被引:4
作者
Li, Na [1 ]
机构
[1] Beijing Univ Posts & Telecommun, State Key Lab Networking & Switching Technol, Beijing 100876, Peoples R China
基金
中国国家自然科学基金; 北京市自然科学基金;
关键词
equality test; trapdoor discrete log groups; identity-based encryption; cloud storage; PUBLIC-KEY ENCRYPTION;
D O I
10.3390/e25020362
中图分类号
O4 [物理学];
学科分类号
0702 ;
摘要
In the cloud, uploading encrypted data is the most effective way to ensure that the data are not leaked. However, data access control is still an open problem in cloud storage systems. To provide an authorization mechanism to limit the comparison of a user's ciphertexts with those of another, public key encryption supporting the equality test with four flexible authorizations (PKEET-FA) is presented. Subsequently, more functional identity-based encryption supporting the equality test (IBEET-FA) further combines identity-based encryption with flexible authorization. The bilinear pairing has always been intended to be replaced due to the high computational cost. Hence, in this paper, we use general trapdoor discrete log groups to construct a new and secure IBEET-FA scheme, which is more efficient. The computational cost for the encryption algorithm in our scheme was reduced to 43% of that of the scheme of Li et al. In Type 2 and 3 authorization algorithms, the computational cost of both was reduced to 40% of that of the scheme of Li et al. Furthermore, we give proof that our scheme is secure against one-wayness under the chosen identity and chosen ciphertext attacks (OW-ID-CCA), and indistinguishable against chosen identity and chosen ciphertext attacks (IND-ID-CCA).
引用
收藏
页数:17
相关论文
共 50 条
[41]   Efficient Selective Identity-Based Encryption Without Random Oracles [J].
Boneh, Dan ;
Boyen, Xavier .
JOURNAL OF CRYPTOLOGY, 2011, 24 (04) :659-693
[42]   Identity based encryption with equality test [J].
Batamuliza, Jennifer ;
Hanyurwimfura, Damien .
INFORMATION SECURITY JOURNAL, 2021, 30 (02) :111-124
[43]   Attack and improvement of the recent identity-based encryption with authorized equivalence test in cluster computing [J].
Choi, Seongbong ;
Lee, Hyung Tae .
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2022, 25 (01) :633-646
[44]   Efficient Identity-Based Encryption from LWR [J].
Cheon, Jung Hee ;
Cho, Haejin ;
Jung, Jaewook ;
Lee, Joohee ;
Lee, Keewoo .
INFORMATION SECURITY AND CRYPTOLOGY, ICISC 2019, 2020, 11975 :225-241
[45]   Efficient identity-based broadcast signcryption schemes [J].
Kim, Intae ;
Hwang, Seong Oun .
SECURITY AND COMMUNICATION NETWORKS, 2014, 7 (05) :914-925
[46]   Efficient Identity-based Encryption from Lattice [J].
Chen, Huiyan ;
Chen, Dongmei ;
Zhang, Yanshuo .
PROCEEDINGS OF 2013 INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE AND CLOUD COMPUTING COMPANION (ISCC-C), 2014, :84-90
[47]   Fine-Grained Attribute-Based Encryption Scheme Supporting Equality Test [J].
Eltayieb, Nabeil ;
Elhabob, Rashad ;
Hassan, Alzubair ;
Li, Fagen .
ALGORITHMS AND ARCHITECTURES FOR PARALLEL PROCESSING, ICA3PP 2018, PT IV, 2018, 11337 :220-233
[48]   Efficient and Fully Secure Lattice-Based IBE with Equality Test [J].
Wu, Zhenghao ;
Weng, Jian ;
Yang, Anjia ;
Yao, Lisha ;
Liang, Xiaojian ;
Jiang, Zike ;
Wen, Jinghang .
INFORMATION AND COMMUNICATIONS SECURITY (ICICS 2021), PT II, 2021, 12919 :301-318
[49]   Cryptanalysis of Zhu et al.'s Identity-Based Encryption With Equality Test Without Random Oracles [J].
Lee, Hyung Tae .
IEEE ACCESS, 2023, 11 :84533-84542
[50]   Efficient designated server identity-based encryption with conjunctive keyword search [J].
Lu, Yang ;
Wang, Gang ;
Li, Jiguo ;
Shen, Jian .
ANNALS OF TELECOMMUNICATIONS, 2017, 72 (5-6) :359-370