Efficient Identity-Based Encryption Scheme with Equality Test in Smart City

被引:27
|
作者
Wu, Libing [1 ]
Zhang, Yubo [1 ]
Choo, Kim-Kwang Raymond [2 ]
He, Debiao [3 ,4 ]
机构
[1] Wuhan Univ, Sch Comp Sci, Wuhan 430072, Hubei, Peoples R China
[2] Univ Texas San Antonio, Dept Informat Syst & Cyber Secur, San Antonio, TX 78229 USA
[3] Wuhan Univ, Sch Comp Sci, State Key Lab Software Engn, Wuhan 430072, Hubei, Peoples R China
[4] Guilin Univ Elect Technol, Guangxi Key Lab Cryptog & Informat Secur, Guilin 541004, Guangxi, Peoples R China
来源
IEEE TRANSACTIONS ON SUSTAINABLE COMPUTING | 2018年 / 3卷 / 01期
基金
中国国家自然科学基金;
关键词
Smart grid; equality test; identity-based; encryption scheme; cloud to edge;
D O I
10.1109/TSUSC.2017.2734110
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
To support a sustainable development of smart city, smart grid is an indispensable part. Sensor technology in smart gird enables interactive real-time data transmission between cloud and the edge of the network. There are a number of research challenges in the design of smart grids. One of these research challenges is balancing customer privacy and the cloud-based power system's function optimization. Identity-based encryption with equality test (IBEET) scheme has recently been identified as a viable solution, in which customers can delegate a trapdoor to the power system control server and the server then searches on the encrypted data to determine whether two different ciphertexts are encryptions of the same plaintext. Unfortunately, existing schemes are inefficient and the trapdoor could be used to perform equality test on any message; thus, leakage of privacy. In this paper, we propose an efficient IBEET scheme with bilinear pairing, which reduces the need for time-consuming HashToPoint function and each trapdoor could only be used to perform the equality test on a particular keyword. We then prove the security of our scheme for one-way chosen-ciphertext security against a chosen identity (OW-ID-CCA) attack in the random oracle model (ROM). The performance evaluation of our scheme demonstrates that in comparison to the scheme of Ma (2016), our scheme achieves a reduction of 36.7 and 39.24 percent in computation costs during the encryption phase and test phase, respectively.
引用
收藏
页码:44 / 55
页数:12
相关论文
共 50 条
  • [1] Efficient and secure identity-based encryption scheme with equality test in cloud computing
    Wu, Libing
    Zhang, Yubo
    Choo, Kim-Kwang Raymond
    He, Debiao
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2017, 73 : 22 - 31
  • [2] Cryptanalysis of an Identity-Based Encryption Scheme With Equality Test and Improvement
    Liao, Yongjian
    Fan, Yu
    Liang, Yikuan
    Liu, Yulu
    Mohammed, Ramadan
    IEEE ACCESS, 2019, 7 : 75067 - 75072
  • [3] An Efficient Identity-Based Encryption With Equality Test in Cloud Computing
    Yang, Zhichao
    He, Debiao
    Qu, Longjiang
    Ye, Qing
    IEEE TRANSACTIONS ON CLOUD COMPUTING, 2023, 11 (03) : 2983 - 2992
  • [4] An Identity-Based Encryption with Equality Test scheme for healthcare social apps
    Lu, Jingwei
    Li, Hongbo
    Huang, Jianye
    Ma, Sha
    Au, Man Ho Allen
    Huang, Qiong
    COMPUTER STANDARDS & INTERFACES, 2024, 87
  • [5] Identity-Based Matchmaking Encryption with Equality Test
    Yan, Zhen
    Lin, Xijun
    Zhang, Xiaoshuai
    Xu, Jianliang
    Qu, Haipeng
    ENTROPY, 2024, 26 (01)
  • [6] Identity-based encryption with outsourced equality test in cloud computing
    Ma, Sha
    INFORMATION SCIENCES, 2016, 328 : 389 - 402
  • [7] Equality Test on Identity-Based Encryption With Cryptographic Reverse Firewalls for Telemedicine Systems
    Elhabob, Rashad
    Eltayieb, Nabeil
    Xiong, Hu
    Kumari, Saru
    IEEE INTERNET OF THINGS JOURNAL, 2025, 12 (02): : 2106 - 2121
  • [8] SM9 Identity-Based Encryption Scheme with Equality Test and Cryptographic Reverse Firewalls
    Xiong H.
    Lin Y.
    Yao T.
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2024, 61 (04): : 1070 - 1084
  • [9] Identity-based encryption with equality test and datestamp-based authorization mechanism
    Lin, Xi-Jun
    Wang, Qihui
    Sun, Lin
    Qu, Haipeng
    THEORETICAL COMPUTER SCIENCE, 2021, 861 : 117 - 132
  • [10] Semi-generic construction of public key encryption and identity-based encryption with equality test
    Lee, Hyung Tae
    Ling, San
    Seo, Jae Hong
    Wang, Huaxiong
    INFORMATION SCIENCES, 2016, 373 : 419 - 440