Efficient Identity-Based Encryption Scheme with Equality Test in Smart City

被引:27
|
作者
Wu, Libing [1 ]
Zhang, Yubo [1 ]
Choo, Kim-Kwang Raymond [2 ]
He, Debiao [3 ,4 ]
机构
[1] Wuhan Univ, Sch Comp Sci, Wuhan 430072, Hubei, Peoples R China
[2] Univ Texas San Antonio, Dept Informat Syst & Cyber Secur, San Antonio, TX 78229 USA
[3] Wuhan Univ, Sch Comp Sci, State Key Lab Software Engn, Wuhan 430072, Hubei, Peoples R China
[4] Guilin Univ Elect Technol, Guangxi Key Lab Cryptog & Informat Secur, Guilin 541004, Guangxi, Peoples R China
来源
IEEE TRANSACTIONS ON SUSTAINABLE COMPUTING | 2018年 / 3卷 / 01期
基金
中国国家自然科学基金;
关键词
Smart grid; equality test; identity-based; encryption scheme; cloud to edge;
D O I
10.1109/TSUSC.2017.2734110
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
To support a sustainable development of smart city, smart grid is an indispensable part. Sensor technology in smart gird enables interactive real-time data transmission between cloud and the edge of the network. There are a number of research challenges in the design of smart grids. One of these research challenges is balancing customer privacy and the cloud-based power system's function optimization. Identity-based encryption with equality test (IBEET) scheme has recently been identified as a viable solution, in which customers can delegate a trapdoor to the power system control server and the server then searches on the encrypted data to determine whether two different ciphertexts are encryptions of the same plaintext. Unfortunately, existing schemes are inefficient and the trapdoor could be used to perform equality test on any message; thus, leakage of privacy. In this paper, we propose an efficient IBEET scheme with bilinear pairing, which reduces the need for time-consuming HashToPoint function and each trapdoor could only be used to perform the equality test on a particular keyword. We then prove the security of our scheme for one-way chosen-ciphertext security against a chosen identity (OW-ID-CCA) attack in the random oracle model (ROM). The performance evaluation of our scheme demonstrates that in comparison to the scheme of Ma (2016), our scheme achieves a reduction of 36.7 and 39.24 percent in computation costs during the encryption phase and test phase, respectively.
引用
收藏
页码:44 / 55
页数:12
相关论文
共 50 条
  • [41] A Multivariate Public Key Encryption Scheme With Equality Test
    Shen, Xiaoying
    Wang, Licheng
    Zhu, Huijun
    Liu, Yuan
    IEEE ACCESS, 2020, 8 : 75463 - 75472
  • [42] Efficient identity-based key encapsulation scheme with wildcards for email systems
    Yang, Yang
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2014, 27 (01) : 171 - 183
  • [43] An Identity-Based Data Aggregation Protocol for the Smart Grid
    Wang, Zhiwei
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2017, 13 (05) : 2428 - 2435
  • [44] An Identity-Based Secure Communication Scheme for Advanced Metering Infrastructure in Smart Grid
    Zhang, Taimin
    Lu, Xin
    Ji, Xiaoyu
    Xu, Wenyuan
    2017 29TH CHINESE CONTROL AND DECISION CONFERENCE (CCDC), 2017, : 6959 - 6964
  • [45] Insecurity of A Key-Policy Attribute Based Encryption Scheme With Equality Test
    Liao, Yongjian
    Chen, Hongjie
    Li, Fagen
    Jiang, Shaoquan
    Zhou, Shijie
    Mohammed, Ramadan
    IEEE ACCESS, 2018, 6 : 10189 - 10196
  • [46] An Anonymous Identity-based With Bilateral Protocol for Smart Grid
    Batamuliza, Jennifer
    Hanyurwimfura, Damien
    INTERNATIONAL ARAB JOURNAL OF INFORMATION TECHNOLOGY, 2021, 18 (3A) : 430 - 437
  • [47] A lattice-based public key encryption scheme with delegated equality test
    Xiao, Kaifeng
    Chen, Xinjian
    Huang, Jianye
    Li, Hongbo
    Huang, Qiong
    COMPUTER STANDARDS & INTERFACES, 2024, 87
  • [48] Attack and improvement of the recent identity-based encryption with authorized equivalence test in cluster computing
    Choi, Seongbong
    Lee, Hyung Tae
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2022, 25 (01): : 633 - 646
  • [49] Fuzzy Identity-Based Identification Scheme
    Tan, Syh-Yuan
    Heng, Swee-Huay
    Goi, Bok-Min
    Moon, SangJae
    U- AND E-SERVICE, SCIENCE AND TECHNOLOGY, 2009, 62 : 123 - +
  • [50] New identity-based key-insulated convertible multi-authenticated encryption scheme
    Hsu, Chien-Lung
    Lin, Han-Yu
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2011, 34 (05) : 1724 - 1731