Efficient Identity-Based Encryption Scheme with Equality Test in Smart City

被引:27
|
作者
Wu, Libing [1 ]
Zhang, Yubo [1 ]
Choo, Kim-Kwang Raymond [2 ]
He, Debiao [3 ,4 ]
机构
[1] Wuhan Univ, Sch Comp Sci, Wuhan 430072, Hubei, Peoples R China
[2] Univ Texas San Antonio, Dept Informat Syst & Cyber Secur, San Antonio, TX 78229 USA
[3] Wuhan Univ, Sch Comp Sci, State Key Lab Software Engn, Wuhan 430072, Hubei, Peoples R China
[4] Guilin Univ Elect Technol, Guangxi Key Lab Cryptog & Informat Secur, Guilin 541004, Guangxi, Peoples R China
来源
IEEE TRANSACTIONS ON SUSTAINABLE COMPUTING | 2018年 / 3卷 / 01期
基金
中国国家自然科学基金;
关键词
Smart grid; equality test; identity-based; encryption scheme; cloud to edge;
D O I
10.1109/TSUSC.2017.2734110
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
To support a sustainable development of smart city, smart grid is an indispensable part. Sensor technology in smart gird enables interactive real-time data transmission between cloud and the edge of the network. There are a number of research challenges in the design of smart grids. One of these research challenges is balancing customer privacy and the cloud-based power system's function optimization. Identity-based encryption with equality test (IBEET) scheme has recently been identified as a viable solution, in which customers can delegate a trapdoor to the power system control server and the server then searches on the encrypted data to determine whether two different ciphertexts are encryptions of the same plaintext. Unfortunately, existing schemes are inefficient and the trapdoor could be used to perform equality test on any message; thus, leakage of privacy. In this paper, we propose an efficient IBEET scheme with bilinear pairing, which reduces the need for time-consuming HashToPoint function and each trapdoor could only be used to perform the equality test on a particular keyword. We then prove the security of our scheme for one-way chosen-ciphertext security against a chosen identity (OW-ID-CCA) attack in the random oracle model (ROM). The performance evaluation of our scheme demonstrates that in comparison to the scheme of Ma (2016), our scheme achieves a reduction of 36.7 and 39.24 percent in computation costs during the encryption phase and test phase, respectively.
引用
收藏
页码:44 / 55
页数:12
相关论文
共 50 条
  • [21] IBEET-RSA: Identity-Based Encryption with Equality Test over RSA for Wireless Body Area Networks
    Mohammed Ramadan
    Yongjian Liao
    Fagen Li
    Shijie Zhou
    Hisham Abdalla
    Mobile Networks and Applications, 2020, 25 : 223 - 233
  • [22] IBEET-RSA: Identity-Based Encryption with Equality Test over RSA for Wireless Body Area Networks
    Ramadan, Mohammed
    Liao, Yongjian
    Li, Fagen
    Zhou, Shijie
    Abdalla, Hisham
    MOBILE NETWORKS & APPLICATIONS, 2020, 25 (01) : 223 - 233
  • [23] Efficient identity-based online/offline encryption and signcryption with short ciphertext
    Lai, Jianchang
    Mu, Yi
    Guo, Fuchun
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2017, 16 (03) : 299 - 311
  • [24] Efficient identity-based online/offline encryption and signcryption with short ciphertext
    Jianchang Lai
    Yi Mu
    Fuchun Guo
    International Journal of Information Security, 2017, 16 : 299 - 311
  • [25] An Efficient Attribute Based Encryption Scheme in Smart Grid
    Yang, Wenti
    Guan, Zhitao
    CYBERSPACE SAFETY AND SECURITY, PT I, 2020, 11982 : 159 - 172
  • [26] Identity-Based Verifiable Aggregator Oblivious Encryption and Its Applications in Smart Grids
    Wang, Zhiwei
    IEEE TRANSACTIONS ON SUSTAINABLE COMPUTING, 2021, 6 (01): : 80 - 89
  • [27] Efficient Anonymous Identity-Based Broadcast Encryption without Random Oracles
    Xie Li
    Ren Yanli
    INTERNATIONAL JOURNAL OF DIGITAL CRIME AND FORENSICS, 2014, 6 (02) : 40 - 51
  • [28] Identity-Based Group Encryption Revisited
    Gupta, Kanika
    Selvi, S. Sharmila Deva
    Rangan, C. Pandu
    Dighe, Shubham Sopan
    INFORMATION AND COMMUNICATIONS SECURITY, ICICS 2017, 2018, 10631 : 205 - 209
  • [29] Identity-Based Key Management Scheme for Smart Grid over Lattice
    Yu, Wangke
    Wang, Shuhua
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2023, 17 (01): : 74 - 96
  • [30] A NOVEL IDENTITY-BASED KEY-INSULATED CONVERTIBLE AUTHENTICATED ENCRYPTION SCHEME
    Lin, Han-Yu
    Hsu, Chien-Lung
    INTERNATIONAL JOURNAL OF FOUNDATIONS OF COMPUTER SCIENCE, 2011, 22 (03) : 739 - 756