Certificateless public key encryption with equality test

被引:64
作者
Qu, Haipeng [1 ]
Yan, Zhen [1 ]
Lin, Xi-Jun [1 ]
Zhang, Qi [1 ]
Sun, Lin [2 ]
机构
[1] Ocean Univ China, Dept Comp Sci & Technol, Qingdao, Peoples R China
[2] Qingdao Univ, Coll Liberal Arts, Qingdao, Peoples R China
关键词
Authorization; Certificateless public key encryption; Key escrow; Equality test; IDENTITY-BASED ENCRYPTION; KEYWORD SEARCH; AUTHORIZATION; PAIRINGS;
D O I
10.1016/j.ins.2018.06.025
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we present the concept of certificateless public key encryption with equality test (CL-PKEET), which integrates certificateless public key cryptography (CL-PKC) into public key encryption with equality test (PKEET) to solve the key escrow problem of identity based encryption with equality test (IBEET). In the CL-PKEET scheme, the receiver first computes his private key with the receiver's secret value and the partial private key generated by the key generation center (KGC). The trapdoor is generated with this private key. Then, using the trapdoor, the receiver authorizes the cloud server to test the equivalence between his ciphertexts and others' ciphertexts. We formalize the system model and definition of CL-PKEET, propose the security models by considering four types of adversaries, and then present a concrete CL-PKEET scheme. Our proposal achieves the IND-CCA security against adversaries without trapdoor, and the OW-CCA security against adversaries with trapdoor. Furthermore, compared with IBEET and PKEET, our proposal which has the features of CL-PKC solves certificate management and key escrow problems simultaneously. (C) 2018 Elsevier Inc. All rights reserved.
引用
收藏
页码:76 / 92
页数:17
相关论文
共 24 条
  • [1] Al-Riyami SS, 2003, LECT NOTES COMPUT SC, V2894, P452
  • [2] [Anonymous], 2013, INT J NETWORK SECURI
  • [3] Baek J, 2008, LECT NOTES COMPUT SC, V5072, P1249, DOI 10.1007/978-3-540-69839-5_96
  • [4] Boneh D, 2004, LECT NOTES COMPUT SC, V3027, P506
  • [5] Boneh D., 2001, Advances in Cryptology - CRTPTO 2001. 21st Annual International Cryptology Conference, Proceedings (Lecture Notes in Computer Science Vol.2139), P213
  • [6] Boyen X., 2005, Proc. 12th ACM Conference on Computer and Communications Security (CCS), P320
  • [7] On cryptographic protocols employing asymmetric pairings - The role of Ψ revisited
    Chatterjee, Sanjit
    Menezes, Alfred
    [J]. DISCRETE APPLIED MATHEMATICS, 2011, 159 (13) : 1311 - 1322
  • [8] Cocks C.C., 2001, Lecture Notes in Computer Science, P360, DOI [DOI 10.1007/3-540-45325-3, DOI 10.1007/3-540-45325-332]
  • [9] Pairings for cryptographers
    Galbraith, Steven D.
    Paterson, Kenneth G.
    Smart, Nigel P.
    [J]. DISCRETE APPLIED MATHEMATICS, 2008, 156 (16) : 3113 - 3121
  • [10] PKE-AET: Public Key Encryption with Authorized Equality Test
    Huang, Kaibin
    Tso, Raylin
    Chen, Yu-Chi
    Rahman, Sk Md Mizanur
    Almogren, Ahmad
    Alamri, Atif
    [J]. COMPUTER JOURNAL, 2015, 58 (10) : 2686 - 2697