Revocable Certificateless Public Key Encryption with Equality Test

被引:5
作者
Tsai, Tung-Tso [1 ]
Lin, Han-Yu [1 ]
Tsai, Han-Ching [1 ]
机构
[1] Natl Taiwan Ocean Univ, Dept Comp Sci & Engn, Keelung 202, Taiwan
来源
INFORMATION TECHNOLOGY AND CONTROL | 2022年 / 51卷 / 04期
关键词
Revocable; certificateless; equality test; public key encryption; bilinear pairing; IDENTITY-BASED ENCRYPTION; ID-BASED SIGNATURE; BROADCAST ENCRYPTION; KEYWORD SEARCH; SCHEME; AUTHENTICATION;
D O I
10.5755/j01.itc.51.4.30691
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Traditional public key cryptography requires certificates as a link between each user's identity and her/his public key. Typically, public key infrastructures (PKI) are used to manage and maintain certificates. However, it takes a lot of resources to build PKI which includes many roles and complex policies. The concept of certificateless public key encryption (CL-PKC) was introduced to eliminate the need for certificates. Based on this concept, a mechanism called certificateless public key encryption with equality test (CL-PKEET) was proposed to ensure the confidentiality of private data and provide an equality test of different ciphertexts. The mechanism is suitable for cloud applications where users cannot only protect personal private data but also enjoy cloud services which test the equality of different ciphertexts. More specifically, any two ciphertexts can be tested to determine whether they are encrypted from the same plaintext. Indeed, any practical system needs to provide a solution to revoke compromised users. However, these existing CL-PKEET schemes do not address the revocation problem, and the related research is scant. Therefore, the aim of this article is to propose the first revocable CL-PKEET scheme called RCL-PKEET which can effectively remove illegal users from the system while maintaining the effectiveness of existing CL-PKEET schemes in encryption, decryption, and equality testing processes. Additionally, we formally demonstrate the security of the proposed scheme under the bilinear Diffie-Hellman assumption.
引用
收藏
页码:638 / 660
页数:23
相关论文
共 50 条
  • [41] Key-Policy Attribute-Based Encryption With Equality Test in Cloud Computing
    Zhu, Huijun
    Wang, Licheng
    Ahmad, Haseeb
    Niu, Xinxin
    [J]. IEEE ACCESS, 2017, 5 : 20428 - 20439
  • [42] On the Security of a Certificateless Public Key Encryption with Keyword Search
    Wu, Tsu-Yang
    Meng, Chao
    Chen, Chien-Ming
    Wang, King-Hang
    Pan, Jeng-Shyang
    [J]. ADVANCES IN INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING, PT I, 2018, 81 : 191 - 197
  • [43] Revocable Certificateless Encryption with Ciphertext Evolution
    Sun, Yinxia
    Zhang, Futai
    Fu, Anmin
    [J]. INFORMATION SECURITY AND PRIVACY, 2018, 10946 : 741 - 749
  • [44] On the Security of a Certificateless Searchable Public Key Encryption Scheme
    Wu, Tsu-Yang
    Meng, Fanya
    Chen, Chien-Ming
    Liu, Shuai
    Pan, Jeng-Shyang
    [J]. GENETIC AND EVOLUTIONARY COMPUTING, 2017, 536 : 113 - 119
  • [45] Public Key Encryption With Equality Test for Industrial Internet of Things Based on Near-Ring
    Muthukumaran, V
    Manimozhi, I
    Sundar, Praveen P., V
    Karthikeyan, T.
    Gopu, Magesh
    [J]. INTERNATIONAL JOURNAL OF E-COLLABORATION, 2021, 17 (03) : 25 - 45
  • [46] Group Public Key Encryption With Equality Test for Dynamic Membership
    Xiang, Ru
    Ma, Sha
    Liu, Xinjie
    [J]. 2021 IEEE 9TH INTERNATIONAL CONFERENCE ON INFORMATION, COMMUNICATION AND NETWORKS (ICICN 2021), 2021, : 351 - 356
  • [47] SECURITY ANALYSIS OF PUBLIC KEY ENCRYPTION WITH FILTERED EQUALITY TEST
    Chen, Yu-Chi
    [J]. ADVANCES IN MATHEMATICS OF COMMUNICATIONS, 2023, 17 (06) : 1358 - 1363
  • [48] Efficient public key encryption with equality test in the standard model
    Zhang, Kai
    Chen, Jie
    Lee, Hyung Tae
    Qian, Haifeng
    Wang, Huaxiong
    [J]. THEORETICAL COMPUTER SCIENCE, 2019, 755 : 65 - 80
  • [49] A Certificateless Threshold Public Key Encryption Scheme
    ZOU Xiubin1
    2.College of Computer and Mathematics
    3.Ira A.Fulton Schools of Engineering
    [J]. Wuhan University Journal of Natural Sciences, 2012, 17 (03) : 223 - 228
  • [50] Certificateless Public Key Encryption with Keyword Search
    Peng Yanguo
    Cui Jiangtao
    Peng Changgen
    Ying Zuobin
    [J]. CHINA COMMUNICATIONS, 2014, 11 (11) : 100 - 113