Revocable Public Key Encryption with Equality Test without Pairing in Cloud Storage

被引:2
作者
Yang, Tian [1 ]
Ma, Sha [1 ]
Du, Jiaojiao [1 ]
Jiang, Chengyu [1 ]
Huang, Qiong [1 ]
机构
[1] South China Agr Univ, Coll Math & Informat, Guangzhou 510642, Peoples R China
基金
中国国家自然科学基金;
关键词
cloud storage; public key encryption; equality test; revocation; IDENTITY-BASED ENCRYPTION; SEARCHABLE ENCRYPTION; GENERIC CONSTRUCTION; KEYWORD SEARCH; AUTHORIZATION; SIGNCRYPTION; SCHEME;
D O I
10.1093/comjnl/bxad006
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Public key encryption with equality test (PKEET) plays an important role in the cloud storage. It allows a third party to test whether two ciphertexts contain the same message without decryption. Since the third party is not fully trusted, it is sometimes necessary to prevent the third party from testing the ciphertexts all the time. To this end, we propose the notion of revocable public key encryption with equality test (R-PKEET). We give the construction of R-PKEET in the random oracle model, which employs time key to update trapdoor and partial ciphertexts. In details, our scheme enables a user to revoke the third party's test right by sending a time key to the cloud server, which is responsible for updating partial ciphertexts using the time key. Compared with related works, our scheme achieves both lightweight revocation and lower computational complexity by using Shamir's secret sharing and Lagrange interpolating polynomial.
引用
收藏
页码:642 / 657
页数:16
相关论文
共 50 条
  • [41] Semi-generic construction of public key encryption and identity-based encryption with equality test
    Lee, Hyung Tae
    Ling, San
    Seo, Jae Hong
    Wang, Huaxiong
    INFORMATION SCIENCES, 2016, 373 : 419 - 440
  • [42] Revocable Public Key Encryption with Authorized Keyword Search
    Xu, Wujing
    Dong, Xiaolei
    Cao, Zhenfu
    Shen, Jiachen
    PROCEEDINGS OF 2019 IEEE 3RD INFORMATION TECHNOLOGY, NETWORKING, ELECTRONIC AND AUTOMATION CONTROL CONFERENCE (ITNEC 2019), 2019, : 857 - 860
  • [43] Efficient public key encryption with revocable keyword search
    Yu, Yong
    Ni, Jianbing
    Yang, Haomiao
    Mu, Yi
    Susilo, Willy
    SECURITY AND COMMUNICATION NETWORKS, 2014, 7 (02) : 466 - 472
  • [44] Group public key encryption with equality test against offline message recovery attack
    Ling, Yunhao
    Ma, Sha
    Huang, Qiong
    Li, Ximing
    Ling, Yunzhi
    INFORMATION SCIENCES, 2020, 510 : 16 - 32
  • [45] Semantic Secure Public Key Encryption with Filtered Equality Test PKE-FET
    Huang, Kaibin
    Chen, Yu-Chi
    Tso, Raylin
    2015 12TH INTERNATIONAL JOINT CONFERENCE ON E-BUSINESS AND TELECOMMUNICATIONS (ICETE), VOL 4, 2015, : 327 - 334
  • [46] Public key encryption with equality test from generic assumptions in the random oracle model
    Lee, Hyung Tae
    Ling, San
    Seo, Jae Hong
    Wang, Huaxiong
    INFORMATION SCIENCES, 2019, 500 : 15 - 33
  • [47] Efficient public-key encryption with equality test from lattices
    Li, Qinyi
    Boyen, Xavier
    THEORETICAL COMPUTER SCIENCE, 2021, 892 : 85 - 107
  • [48] Equality Test Public Key Encryption With Cryptographic Reverse Firewalls for Cloud-Based E-Commerce
    Elhabob, Rashad
    Eltayieb, Nabeil
    Xiong, Hu
    Khan, Fazlullah
    Bashir, Ali Kashif
    Kumari, Saru
    Alturki, Ryan
    Kumar, Sachin
    IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2024, 70 (04) : 6763 - 6775
  • [49] Multi-Recipient encryption with keyword search without pairing for cloud storage
    Ningbin Yang
    Quan Zhou
    Qiong Huang
    Chunming Tang
    Journal of Cloud Computing, 11
  • [50] Efficient Secure-Channel Free Public Key Encryption with Keyword Search for EMRs in Cloud Storage
    Guo, Lifeng
    Yau, Wei-Chuen
    JOURNAL OF MEDICAL SYSTEMS, 2015, 39 (02)