Efficient Identity-Based Encryption Scheme with Equality Test in Smart City

被引:27
|
作者
Wu, Libing [1 ]
Zhang, Yubo [1 ]
Choo, Kim-Kwang Raymond [2 ]
He, Debiao [3 ,4 ]
机构
[1] Wuhan Univ, Sch Comp Sci, Wuhan 430072, Hubei, Peoples R China
[2] Univ Texas San Antonio, Dept Informat Syst & Cyber Secur, San Antonio, TX 78229 USA
[3] Wuhan Univ, Sch Comp Sci, State Key Lab Software Engn, Wuhan 430072, Hubei, Peoples R China
[4] Guilin Univ Elect Technol, Guangxi Key Lab Cryptog & Informat Secur, Guilin 541004, Guangxi, Peoples R China
来源
IEEE TRANSACTIONS ON SUSTAINABLE COMPUTING | 2018年 / 3卷 / 01期
基金
中国国家自然科学基金;
关键词
Smart grid; equality test; identity-based; encryption scheme; cloud to edge;
D O I
10.1109/TSUSC.2017.2734110
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
To support a sustainable development of smart city, smart grid is an indispensable part. Sensor technology in smart gird enables interactive real-time data transmission between cloud and the edge of the network. There are a number of research challenges in the design of smart grids. One of these research challenges is balancing customer privacy and the cloud-based power system's function optimization. Identity-based encryption with equality test (IBEET) scheme has recently been identified as a viable solution, in which customers can delegate a trapdoor to the power system control server and the server then searches on the encrypted data to determine whether two different ciphertexts are encryptions of the same plaintext. Unfortunately, existing schemes are inefficient and the trapdoor could be used to perform equality test on any message; thus, leakage of privacy. In this paper, we propose an efficient IBEET scheme with bilinear pairing, which reduces the need for time-consuming HashToPoint function and each trapdoor could only be used to perform the equality test on a particular keyword. We then prove the security of our scheme for one-way chosen-ciphertext security against a chosen identity (OW-ID-CCA) attack in the random oracle model (ROM). The performance evaluation of our scheme demonstrates that in comparison to the scheme of Ma (2016), our scheme achieves a reduction of 36.7 and 39.24 percent in computation costs during the encryption phase and test phase, respectively.
引用
收藏
页码:44 / 55
页数:12
相关论文
共 50 条
  • [31] Privacy-preserving identity-based file sharing in smart city
    Luo, Xiling
    Ren, Yili
    Hu, Jiankun
    Wu, Qianhong
    Lou, Jungang
    PERSONAL AND UBIQUITOUS COMPUTING, 2017, 21 (05) : 923 - 936
  • [32] Privacy-preserving identity-based file sharing in smart city
    Xiling Luo
    Yili Ren
    Jiankun Hu
    Qianhong Wu
    Jungang Lou
    Personal and Ubiquitous Computing, 2017, 21 : 923 - 936
  • [33] Secure Equality Test Technique Using Identity-Based Signcryption for Telemedicine Systems
    Ramadan, Mohammed
    Raza, Shahid
    IEEE INTERNET OF THINGS JOURNAL, 2023, 10 (18) : 16594 - 16604
  • [34] Identity-based encryption with authorized equivalence test for cloud-assisted IoT
    Elhabob, Rashad
    Zhao, Yanan
    Eltayieb, Nabeil
    Abdelgader, Abdeldime M. S.
    Xiong, Hu
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2020, 23 (02): : 1085 - 1101
  • [35] An efficient certificateless public key encryption scheme with authorized equality test in healthcare environments
    Hassan, Abdelrhman
    Wang, Yong
    Elhabob, Rashad
    Eltayieb, Nabeil
    Li, Fagen
    JOURNAL OF SYSTEMS ARCHITECTURE, 2020, 109
  • [36] An efficient identity-based signature protocol over lattices for the smart grid
    Zhu, Longzhu
    Jiang, Fan
    Luo, Min
    Li, Quanrun
    HIGH-CONFIDENCE COMPUTING, 2023, 3 (04):
  • [37] Efficient Hierarchical Identity Based Encryption Scheme in the Standard Model
    Ren, Yanli
    Gu, Dawu
    INFORMATICA-JOURNAL OF COMPUTING AND INFORMATICS, 2008, 32 (02): : 207 - 211
  • [38] Hierarchical Identity-Based Online/Offline Encryption
    Liu, Zhongren
    Xu, Li
    Chen, Zhide
    Mu, Yi
    Guo, Fuchun
    PROCEEDINGS OF THE 9TH INTERNATIONAL CONFERENCE FOR YOUNG COMPUTER SCIENTISTS, VOLS 1-5, 2008, : 2115 - +
  • [39] Identity-Based Broadcast Encryption with Recipient Privacy
    Zhang, Weimin
    Xu, Qiuliang
    He, Peng
    PROCEEDINGS OF 2010 3RD IEEE INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY (ICCSIT 2010), VOL 8, 2010, : 483 - 487
  • [40] Traceable Scheme of Public Key Encryption with Equality Test
    Zhu, Huijun
    Xue, Qingji
    Li, Tianfeng
    Xie, Dong
    ENTROPY, 2022, 24 (03)