Revocable Certificateless Public Key Encryption with Equality Test

被引:5
|
作者
Tsai, Tung-Tso [1 ]
Lin, Han-Yu [1 ]
Tsai, Han-Ching [1 ]
机构
[1] Natl Taiwan Ocean Univ, Dept Comp Sci & Engn, Keelung 202, Taiwan
来源
INFORMATION TECHNOLOGY AND CONTROL | 2022年 / 51卷 / 04期
关键词
Revocable; certificateless; equality test; public key encryption; bilinear pairing; IDENTITY-BASED ENCRYPTION; ID-BASED SIGNATURE; BROADCAST ENCRYPTION; KEYWORD SEARCH; SCHEME; AUTHENTICATION;
D O I
10.5755/j01.itc.51.4.30691
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Traditional public key cryptography requires certificates as a link between each user's identity and her/his public key. Typically, public key infrastructures (PKI) are used to manage and maintain certificates. However, it takes a lot of resources to build PKI which includes many roles and complex policies. The concept of certificateless public key encryption (CL-PKC) was introduced to eliminate the need for certificates. Based on this concept, a mechanism called certificateless public key encryption with equality test (CL-PKEET) was proposed to ensure the confidentiality of private data and provide an equality test of different ciphertexts. The mechanism is suitable for cloud applications where users cannot only protect personal private data but also enjoy cloud services which test the equality of different ciphertexts. More specifically, any two ciphertexts can be tested to determine whether they are encrypted from the same plaintext. Indeed, any practical system needs to provide a solution to revoke compromised users. However, these existing CL-PKEET schemes do not address the revocation problem, and the related research is scant. Therefore, the aim of this article is to propose the first revocable CL-PKEET scheme called RCL-PKEET which can effectively remove illegal users from the system while maintaining the effectiveness of existing CL-PKEET schemes in encryption, decryption, and equality testing processes. Additionally, we formally demonstrate the security of the proposed scheme under the bilinear Diffie-Hellman assumption.
引用
收藏
页码:638 / 660
页数:23
相关论文
共 50 条
  • [21] Public key encryption with equality test via hash proof system
    Zeng, Ming
    Chen, Jie
    Zhang, Kai
    Qian, Haifeng
    THEORETICAL COMPUTER SCIENCE, 2019, 795 : 20 - 35
  • [22] Public Key Encryption with Equality Test for Heterogeneous Systems in Cloud Computing
    Elhabob, Rashad
    Zhao, Yanan
    Sella, Iva
    Xiong, Hu
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2019, 13 (09): : 4742 - 4770
  • [23] A Revocable Certificateless Encryption Scheme for Multi-User
    Mou, Yiming
    Deng, Lunzhi
    Ruan, Yu
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2025, 37 (01)
  • [24] Probabilistic Public Key Encryption with Equality Test
    Yang, Guomin
    Tan, Chik How
    Huang, Qiong
    Wong, Duncan S.
    TOPICS IN CRYPTOLOGY - CT-RSA 2010, PROCEEDINGS, 2010, 5985 : 119 - +
  • [25] Revocable Certificateless Public Key Encryption With Outsourced Semi-Trusted Cloud Revocation Agent
    Ma, Mingxin
    Shi, Guozhen
    Shi, Xinyi
    Su, Mang
    Li, Fenghua
    IEEE ACCESS, 2020, 8 (08): : 148157 - 148168
  • [26] Public Key Authenticated Encryption With Designated Equality Test and Its Applications in Diagnostic Related Groups
    Wang, Yuanhao
    Huang, Qiong
    Li, Hongbo
    Huang, Jianye
    Yang, Guomin
    Susilo, Willy
    IEEE ACCESS, 2019, 7 : 135999 - 136011
  • [27] Efficient All-or-Nothing Public Key Encryption With Authenticated Equality Test
    Zhao, Zhi-Yan
    Zeng, Peng
    IEEE ACCESS, 2021, 9 : 94099 - 94108
  • [28] A lattice-based public key encryption scheme with delegated equality test
    Xiao, Kaifeng
    Chen, Xinjian
    Huang, Jianye
    Li, Hongbo
    Huang, Qiong
    COMPUTER STANDARDS & INTERFACES, 2024, 87
  • [29] Semi-generic construction of public key encryption and identity-based encryption with equality test
    Lee, Hyung Tae
    Ling, San
    Seo, Jae Hong
    Wang, Huaxiong
    INFORMATION SCIENCES, 2016, 373 : 419 - 440
  • [30] Revocable Public Key Encryption with Authorized Keyword Search
    Xu, Wujing
    Dong, Xiaolei
    Cao, Zhenfu
    Shen, Jiachen
    PROCEEDINGS OF 2019 IEEE 3RD INFORMATION TECHNOLOGY, NETWORKING, ELECTRONIC AND AUTOMATION CONTROL CONFERENCE (ITNEC 2019), 2019, : 857 - 860