Revocable Certificateless Public Key Encryption with Equality Test

被引:5
|
作者
Tsai, Tung-Tso [1 ]
Lin, Han-Yu [1 ]
Tsai, Han-Ching [1 ]
机构
[1] Natl Taiwan Ocean Univ, Dept Comp Sci & Engn, Keelung 202, Taiwan
来源
INFORMATION TECHNOLOGY AND CONTROL | 2022年 / 51卷 / 04期
关键词
Revocable; certificateless; equality test; public key encryption; bilinear pairing; IDENTITY-BASED ENCRYPTION; ID-BASED SIGNATURE; BROADCAST ENCRYPTION; KEYWORD SEARCH; SCHEME; AUTHENTICATION;
D O I
10.5755/j01.itc.51.4.30691
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Traditional public key cryptography requires certificates as a link between each user's identity and her/his public key. Typically, public key infrastructures (PKI) are used to manage and maintain certificates. However, it takes a lot of resources to build PKI which includes many roles and complex policies. The concept of certificateless public key encryption (CL-PKC) was introduced to eliminate the need for certificates. Based on this concept, a mechanism called certificateless public key encryption with equality test (CL-PKEET) was proposed to ensure the confidentiality of private data and provide an equality test of different ciphertexts. The mechanism is suitable for cloud applications where users cannot only protect personal private data but also enjoy cloud services which test the equality of different ciphertexts. More specifically, any two ciphertexts can be tested to determine whether they are encrypted from the same plaintext. Indeed, any practical system needs to provide a solution to revoke compromised users. However, these existing CL-PKEET schemes do not address the revocation problem, and the related research is scant. Therefore, the aim of this article is to propose the first revocable CL-PKEET scheme called RCL-PKEET which can effectively remove illegal users from the system while maintaining the effectiveness of existing CL-PKEET schemes in encryption, decryption, and equality testing processes. Additionally, we formally demonstrate the security of the proposed scheme under the bilinear Diffie-Hellman assumption.
引用
收藏
页码:638 / 660
页数:23
相关论文
共 50 条
  • [41] Public Key Encryption with Equality Test for Heterogeneous Systems in Cloud Computing
    Elhabob, Rashad
    Zhao, Yanan
    Sella, Iva
    Xiong, Hu
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2019, 13 (09): : 4742 - 4770
  • [42] Efficient public-key encryption with equality test from lattices
    Li, Qinyi
    Boyen, Xavier
    THEORETICAL COMPUTER SCIENCE, 2021, 892 : 85 - 107
  • [43] A new lightweight public key encryption with equality test for cloud storage
    Hao Lin
    Gaohua Zhao
    Shouyou Song
    Wei Wu
    Wei Jiang
    Multimedia Tools and Applications, 2024, 83 : 28947 - 28968
  • [44] Pairing-Free for Public Key Encryption With Equality Test Scheme
    Zhu, Huijun
    Wang, Licheng
    Ahmad, Haseeb
    Xie, Dong
    IEEE ACCESS, 2021, 9 : 77239 - 77249
  • [45] Group Public Key Encryption with Equality Test under Standard Model
    Deng, Xiangtian
    Qian, Haifeng
    SECURITY AND COMMUNICATION NETWORKS, 2022, 2022
  • [46] A new lightweight public key encryption with equality test for cloud storage
    Lin, Hao
    Zhao, Gaohua
    Song, Shouyou
    Wu, Wei
    Jiang, Wei
    MULTIMEDIA TOOLS AND APPLICATIONS, 2024, 83 (10) : 28947 - 28968
  • [47] Public key encryption with equality test via hash proof system
    Zeng, Ming
    Chen, Jie
    Zhang, Kai
    Qian, Haifeng
    THEORETICAL COMPUTER SCIENCE, 2019, 795 : 20 - 35
  • [48] On the Security of a Certificateless Public Key Encryption with Keyword Search
    Wu, Tsu-Yang
    Meng, Chao
    Chen, Chien-Ming
    Wang, King-Hang
    Pan, Jeng-Shyang
    ADVANCES IN INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING, PT I, 2018, 81 : 191 - 197
  • [49] Certificateless public key encryption from the Weil pairing
    Shi, Yijuan
    Li, Jianhua
    Shi, Jianjun
    WMSCI 2006: 10TH WORLD MULTI-CONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL II, PROCEEDINGS, 2006, : 315 - 320
  • [50] RSA-Based Certificateless Public Key Encryption
    Lai, Junzuo
    Deng, Robert H.
    Liu, Shengli
    Kou, Weidong
    INFORMATION SECURITY PRACTICE AND EXPERIENCE, PROCEEDINGS: 5TH INTERNATIONAL CONFERENCE, ISPEC 2009, 2009, 5451 : 24 - +