Efficient public key encryption with equality test in the standard model

被引:38
|
作者
Zhang, Kai [1 ,2 ]
Chen, Jie [2 ,3 ]
Lee, Hyung Tae [4 ]
Qian, Haifeng [3 ]
Wang, Huaxiong [5 ]
机构
[1] Shanghai Univ Elect Power, Coll Comp Sci & Technol, Dept Informat Secur, Shanghai, Peoples R China
[2] Xidian Univ, State Key Lab Integrated Serv Networks, Xian, Shaanxi, Peoples R China
[3] East China Normal Univ, Dept Comp Sci & Technol, Shanghai, Peoples R China
[4] Chonbuk Natl Univ, Coll Engn, Div Comp Sci & Engn, Jeonju, Jeollabuk Do, South Korea
[5] Nanyang Technol Univ, Sch Phys & Math Sci, Div Math Sci, Singapore, Singapore
基金
中国国家自然科学基金;
关键词
Public key encryption with equality test; Standard model; Adaptive chosen ciphertext security; IDENTITY-BASED ENCRYPTION; SECURE;
D O I
10.1016/j.tcs.2018.06.048
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Public key encryption with equality test (PKEET) is a special kind of public encryption scheme (PKE) that allows a tester to perform equality tests on ciphertexts generated by different public keys as well as the same public key. This feature enables us to apply PKEET to various scenarios in practice, such as efficient data management on encrypted databases and spam filtering in encrypted email systems. From these reasons, since Yang et al. [1] first proposed the concept of PKEET, there have been proposed many PKEET schemes to improve efficiency or to enhance functionalities. However, to the best of our knowledge, almost all existing schemes were presented under assuming the existence of random oracles, except for generic construction proposed by Lee et al. On the other hand, their generic approach for PKEET employs a 2-level hierarchical identity-based encryption and a strongly unforgeable one-time signature, which suffers from low efficiency. In this paper, we propose an efficient PKEET scheme under a specific cryptographic assumption in the standard model. To this end, we first encrypt a message and its hash value in a parallel way by following the recently proposed strategy. Then, to prevent adaptive chosen ciphertext attacks (CCA2), we give a link between them by adapting the technique which was originally proposed for identity-based encryption and previously exploited to design efficient CCA2-secure PKE schemes. We show that our proposed construction satisfies formal security requirements for PKEET under the decisional bilinear Diffie-Hellman (DBDH) assumption in the standard model. As a result, we obtain a new PKEET scheme which has shorter ciphertext and trapdoor sizes, and improves computational costs for encryption, decryption, and test algorithms, by about 60%, 77%, and 66%, respectively, compared to a PKEET instantiation obtained by the prior generic framework. (C) 2018 Elsevier B.V. All rights reserved.
引用
收藏
页码:65 / 80
页数:16
相关论文
共 50 条
  • [31] Binary Tree Encryption with Constant-Size Public Key in the Standard Model
    Feng, Shengyuan
    Gong, Junqing
    Chen, Jie
    COMPUTER JOURNAL, 2022, 65 (06) : 1489 - 1511
  • [32] Token-controlled public key encryption in the standard model
    Chow, Sherman S. M.
    Information Security, Proceedings, 2007, 4779 : 315 - 332
  • [33] Public key encryption with equality test for Industrial Internet of Things system in cloud computing
    Deverajan, Ganesh Gopal
    Muthukumaran, V.
    Hsu, Ching-Hsien
    Karuppiah, Marimuthu
    Chung, Yeh-Ching
    Chen, Ying-Huei
    TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2022, 33 (04)
  • [34] Lightweight Public Key Encryption With Equality Test Supporting Partial Authorization in Cloud Storage
    Lin, Hao
    Zhao, Zhen
    Gao, Fei
    Susilo, Willy
    Wen, Qiaoyan
    Guo, Fuchun
    Shi, Yijie
    COMPUTER JOURNAL, 2021, 64 (08) : 1226 - 1238
  • [35] Public key encryption supporting equality test and flexible authorization without bilinear pairings
    Lin, Xi-Jun
    Sun, Lin
    Qu, Haipeng
    Zhang, Xiaoshuai
    COMPUTER COMMUNICATIONS, 2021, 170 : 190 - 199
  • [36] Efficient Certificateless Public Key Cryptography With Equality Test for Internet of Vehicles
    Elhabob, Rashad
    Zhao, Yanan
    Sella, Iva
    Xiong, Hu
    IEEE ACCESS, 2019, 7 : 68957 - 68969
  • [37] An efficient certificateless public key cryptography with authorized equality test in IIoT
    Elhabob, Rashad
    Zhao, Yanan
    Sella, Iva
    Xiong, Hu
    JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2020, 11 (03) : 1065 - 1083
  • [38] Public Key Encryption with Authorized Equality Test on Outsourced Ciphertexts for Cloud-Assisted IoT in Dual Server Model
    Zhao, Meng
    Ding, Yong
    Tang, Shijie
    Liang, Hai
    Wang, Huiyong
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2022, 2022
  • [39] New Chosen Ciphertext Secure Public Key Encryption in the Standard Model with Public Verifiability
    Weng, Zhiwei
    Weng, Jian
    He, Kai
    Li, Yingkai
    ADVANCED INTELLIGENT COMPUTING THEORIES AND APPLICATIONS: WITH ASPECTS OF ARTIFICIAL INTELLIGENCE, 2012, 6839 : 170 - 176
  • [40] New Public Key Encryption with Equality Test Based on non-Abelian Factorization Problems
    Zhu, Huijun
    Wang, Licheng
    Qiu, Shuming
    Niu, Xinxin
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2018, 12 (02): : 764 - 785