Group ID-Based Encryption with Equality Test

被引:18
作者
Ling, Yunhao [1 ]
Ma, Sha [1 ]
Huang, Qiong [1 ]
Xiang, Ru [1 ]
Li, Ximing [1 ]
机构
[1] South China Agr Univ, Guangzhou, Guangdong, Peoples R China
来源
INFORMATION SECURITY AND PRIVACY, ACISP 2019 | 2019年 / 11547卷
基金
中国国家自然科学基金;
关键词
ID-based encryption; Equality test; Group; Insider attack; PUBLIC-KEY ENCRYPTION; IDENTITY-BASED ENCRYPTION; EFFICIENT; SCHEME;
D O I
10.1007/978-3-030-21548-4_3
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In era of cloud computing, how to search on encrypted data has been studied extensively. ID-based encryption with equality test (IBEET) as a type of searchable encryption allows a tester (insider) to check whether two ciphertexts encrypted under different identities contain the same message. Due to its equality test functionality, IBEET has many interesting applications, such as personal health record systems. In this paper, we first introduce group mechanism into IBEET and propose a new primitive, namely group ID-based encryption with equality test (G-IBEET). By the group mechanism, G-IBEET supports group granularity authorization. That is, a group administrator, who is trusted by group users, would issue the insider a group trapdoor to specify that it can only compare on ciphertexts of the group users but cannot compare with ciphertexts of any users other than them. Moreover, the workload of generation and management of trapdoors can be greatly reduced due to the group granularity authorization. For the insider attack which exists in most IBEET schemes with the goal of recovering the message from a ciphertext by mounting an offline message recovery attack, G-IBEET provides a nice solution for IBEET to resist it by the group mechanism. We propose a G-IBEET scheme in bilinear pairings, prove its security in the random oracle model and show that the proposed scheme has a more efficient test algorithm.
引用
收藏
页码:39 / 57
页数:19
相关论文
共 28 条
[1]  
[Anonymous], 2016, IACR CRYPTOL EPRINT, DOI DOI 10.1016/J.COMCOM.2021.02.006
[2]  
[Anonymous], 2016, IACR CRYPTOL EPRINT
[3]  
Boneh D, 2004, LECT NOTES COMPUT SC, V3027, P506
[4]   Dual-Server Public-Key Encryption With Keyword Search for Secure Cloud Storage [J].
Chen, Rongmao ;
Mu, Yi ;
Yang, Guomin ;
Guo, Fuchun ;
Wang, Xiaofen .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2016, 11 (04) :789-798
[5]   A New General Framework for Secure Public Key Encryption with Keyword Search [J].
Chen, Rongmao ;
Mu, Yi ;
Yang, Guomin ;
Guo, Fuchun ;
Wang, Xiaofen .
INFORMATION SECURITY AND PRIVACY (ACISP 2015), 2015, 9144 :59-76
[6]   One Step Quantum Key Distribution Protocol Based on the Hyperentangled Bell State [J].
Hou, Yanyan ;
Li, Jian ;
Li, Hengji ;
Li, Chao-Yang ;
Yang, Yuguang ;
Wang, Na ;
Zhou, Zhengyan .
IEEE ACCESS, 2019, 7 :120006-120013
[7]   PKE-AET: Public Key Encryption with Authorized Equality Test [J].
Huang, Kaibin ;
Tso, Raylin ;
Chen, Yu-Chi ;
Rahman, Sk Md Mizanur ;
Almogren, Ahmad ;
Alamri, Atif .
COMPUTER JOURNAL, 2015, 58 (10) :2686-2697
[8]  
Huang KB, 2014, LECT NOTES COMPUT SC, V8792, P550, DOI 10.1007/978-3-319-11698-3_45
[9]   An efficient public-key searchable encryption scheme secure against inside keyword guessing attacks [J].
Huang, Qiong ;
Li, Hongbo .
INFORMATION SCIENCES, 2017, 403 :1-14
[10]   Semi-generic construction of public key encryption and identity-based encryption with equality test [J].
Lee, Hyung Tae ;
Ling, San ;
Seo, Jae Hong ;
Wang, Huaxiong .
INFORMATION SCIENCES, 2016, 373 :419-440