Public Key Encryption with Equality Test for Heterogeneous Systems in Cloud Computing

被引:10
作者
Elhabob, Rashad [1 ]
Zhao, Yanan [1 ]
Sella, Iva [1 ]
Xiong, Hu [1 ]
机构
[1] Univ Elect Sci & Technol China, Sch Informat & Software Engn, Chengdu 610054, Sichuan, Peoples R China
来源
KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS | 2019年 / 13卷 / 09期
关键词
Cloud computing; searchable encryption; equality test; heterogeneous systems; IDENTITY-BASED ENCRYPTION; SCHEME; EFFICIENT;
D O I
10.3837/tiis.2019.09.023
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud computing provides a broad range of services like operating systems, hardware, software and resources. Availability of these services encourages data owners to outsource their intensive computations and massive data to the cloud. However, considering the untrusted nature of cloud server, it is essential to encrypt the data before outsourcing it to the cloud. Unfortunately, this leads to a challenge when it comes to providing search functionality for encrypted data located in the cloud. To address this challenge, this paper presents a public key encryption with equality test for heterogeneous systems (PKE-ET-HS). The PKE-ET-HS scheme simulates certificateless public encryption with equality test (CLE-ET) with the identity-based encryption with equality test (IBE-ET). This scheme provides the authorized cloud server the right to actuate the equivalence of two messages having their encryptions performed under heterogeneous systems. Basing on the random oracle model, we construct the security of our proposed scheme under the bilinear Diffie-Hellman (BDH) assumption. Eventually, we evaluate the size of storage, computation complexities, and properties with other related works and illustrations indicate good performance from our scheme.
引用
收藏
页码:4742 / 4770
页数:29
相关论文
共 26 条
  • [1] Searchable encryption revisited: Consistency properties, relation to anonymous IBE, and extensions
    Abdalla, Michel
    Bellare, Mihir
    Catalano, Dario
    Kiltz, Eike
    Kohno, Tadayoshi
    Lange, Tanja
    Malone-Lee, John
    Neven, Gregory
    Paillier, Pascal
    Shi, Haixia
    [J]. JOURNAL OF CRYPTOLOGY, 2008, 21 (03) : 350 - 391
  • [2] Al-Riyami SS, 2003, LECT NOTES COMPUT SC, V2894, P452
  • [3] [Anonymous], 2018, IEEE T SUSTAIN COMPU
  • [4] Boneh D, 2004, LECT NOTES COMPUT SC, V3027, P506
  • [5] Boneh D., 2001, Advances in Cryptology - CRTPTO 2001. 21st Annual International Cryptology Conference, Proceedings (Lecture Notes in Computer Science Vol.2139), P213
  • [6] Integration of Cloud computing and Internet of Things: A survey
    Botta, Alessio
    de Donato, Walter
    Persico, Valerio
    Pescape, Antonio
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2016, 56 : 684 - 700
  • [7] Mobile cloud computing: A survey
    Fernando, Niroshinie
    Loke, Seng W.
    Rahayu, Wenny
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2013, 29 (01): : 84 - 106
  • [8] Sharing your privileges securely: a key-insulated attribute based proxy re-encryption scheme for IoT
    Hong, Hanshu
    Sun, Zhixin
    [J]. WORLD WIDE WEB-INTERNET AND WEB INFORMATION SYSTEMS, 2018, 21 (03): : 595 - 607
  • [9] Achieving secure data access control and efficient key updating in mobile multimedia sensor networks
    Hong, Hanshu
    Sun, Zhixin
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2018, 77 (04) : 4477 - 4490
  • [10] A Key-Insulated Ciphertext Policy Attribute Based Signcryption for Mobile Networks
    Hong, Hanshu
    Sun, Zhixin
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2017, 95 (02) : 1215 - 1228