Dual-Server Identity-Based Encryption with Authorized Equality Test for IoT Data in Clouds

被引:0
作者
Zhao, Meng [1 ]
Ding, Yong [1 ,2 ]
机构
[1] Guilin Univ Elect Technol, Sch Comp Sci & Informat Secur, Guangxi Key Lab Cryptog & Informat Secur, Guilin, Peoples R China
[2] Pengcheng Lab, Cyberspace Secur Res Ctr, Shenzhen, Peoples R China
基金
中国国家自然科学基金;
关键词
PUBLIC-KEY ENCRYPTION; ID-BASED ENCRYPTION; EFFICIENT; CIPHERTEXTS; SCHEME;
D O I
10.1155/2022/4905763
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The massive amounts of data collected by Internet of things (IoT) devices can be stored in clouds to solve the problem of the low storage capacity of IoT terminals. However, the privacy and security of outsourced IoT data may be compromised on the cloud side. Traditional cryptographic technologies can protect data privacy but require the user to retrieve the data for decryption and further processing, which would bring vast amounts of bandwidth and computation burden to users. This paper proposes a dual-server identity-based encryption scheme supporting authorized ciphertext equality test (DS-IBE-AET), where two noncolluding servers with authorizations from users can collaboratively carry out an equality test on outsourced IoT ciphertexts without decrypting the data. DS-IBE-AET can resist offline keyword guessing attacks confronted by existing encryption schemes with equality test in the single server model. Security analysis demonstrates that the proposed DS-IBE-AET scheme offers unforgeability for private keys of users and servers and confidentiality protection for outsourced IoT data and authentication tokens. The performance analysis indicates the practicality of our DS-IBE-AET construction for securing outsourced IoT data in clouds.
引用
收藏
页数:12
相关论文
共 34 条
  • [1] Alornyo S., 2020, INT J NETW SECUR, V22, P743
  • [2] Boneh D, 2004, LECT NOTES COMPUT SC, V3027, P506
  • [3] Short signatures from the Weil pairing
    Boneh, D
    Lynn, B
    Shacham, H
    [J]. JOURNAL OF CRYPTOLOGY, 2004, 17 (04) : 297 - 319
  • [4] Identity-based encryption from the Weil pairing
    Boneh, D
    Franklin, M
    [J]. SIAM JOURNAL ON COMPUTING, 2003, 32 (03) : 586 - 615
  • [5] Dual-Server Public-Key Encryption With Keyword Search for Secure Cloud Storage
    Chen, Rongmao
    Mu, Yi
    Yang, Guomin
    Guo, Fuchun
    Wang, Xiaofen
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2016, 11 (04) : 789 - 798
  • [6] Attribute-Based Storage Supporting Secure Deduplication of Encrypted Data in Cloud
    Cui, Hui
    Deng, Robert H.
    Li, Yingjiu
    Wu, Guowei
    [J]. IEEE TRANSACTIONS ON BIG DATA, 2019, 5 (03) : 330 - 342
  • [7] A survey of lattice based expressive attribute based encryption
    Fu, Xingbing
    Ding, Yong
    Li, Haifeng
    Ning, Jianting
    Wu, Ting
    Li, Fagen
    [J]. COMPUTER SCIENCE REVIEW, 2022, 43
  • [8] Large universe attribute based access control with efficient decryption in cloud storage system
    Fu, Xingbing
    Nie, Xuyun
    Wu, Ting
    Li, Fagen
    [J]. JOURNAL OF SYSTEMS AND SOFTWARE, 2018, 135 : 157 - 164
  • [9] An Efficient Identity-Based Conditional Privacy-Preserving Authentication Scheme for Vehicular Ad Hoc Networks
    He, Debiao
    Zeadally, Sherali
    Xu, Baowen
    Huang, Xinyi
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2015, 10 (12) : 2681 - 2691
  • [10] Public key encryption with equality test in the standard model
    Lee, Hyung Tae
    Ling, San
    Seo, Jae Hong
    Wang, Huaxiong
    Youn, Taek-Young
    [J]. INFORMATION SCIENCES, 2020, 516 : 89 - 108