zbMATH — the first resource for mathematics

Identity-based encryption with outsourced equality test in cloud computing. (English) Zbl 1390.68278
Summary: We firstly combine the concepts of public key encryption with equality test (PKEET) and identity-based encryption (IBE) to obtain identity-based encryption with equality test (IBEET). Inheriting the advantage of IBE, IBEET can simplify the certificate management of PKEET with all messages encrypted with the receiver’s public identity. In the IBEET scheme, the receiver computes a trapdoor using the secret value for the identity and then sends it to a cloud server for equality test on its ciphertexts with others’ ciphertexts. Using this primitive someone with the trapdoor for its identity can delegate out the capability of equality test on its ciphertexts without requiring a central authority to act as a delegator. So it is very suitable for the client with minimal computation resource, e.g, mobile phone. Furthermore, compared with PKEET, it has security improvement since not anyone can perform the test. Therefore, IBEET may have interesting applications in cloud computing, e.g., partition of encrypted emails. We define one-way chosen-ciphertext security against a chosen identity attack (OW-ID-CCA) and propose a construction in bilinear pairing. Finally, extensive security analysis and comparison with related works show that the proposed scheme is proven secure and useful.

94A60 Cryptography
68P25 Data encryption (aspects in computer science)
68M11 Internet topics
Full Text: DOI
[1] http://www.eetrust.com/safemail/index.jhtml. (accessed 2014).
[2] Abdalla, M.; Bellare, M.; Catalano, D.; Kiltz, E.; Kohno, T.; Lange, T.; Malone-Lee, J.; Neven, G.; Paillier, P.; Shi, H., Searchable encryption revisited: consistency properties, relation to anonymous IBE, and extensions, J. Cryptol., 21, 3, 350-391, (2008) · Zbl 1161.94378
[3] Boneh, D.; Crescenzo, G. D.; Ostrovsky, R.; Persiano, G., Public key encryption with keyword search, Advances in Cryptology - EUROCRYPT 2004, Interlaken, Switzerland, LNCS, 3027, (2004), Springer Berlin · Zbl 1122.68424
[4] Boneh, D.; Franklin, M., Identity-based encryption from the Weil pairing, Advances in Cryptology - CRYPTO 2001, Santa Barbara, California, USA, LNCS, 2139, (2001), Springer Berlin · Zbl 1002.94023
[5] Boneh, D.; Waters, B., Conjunctive, subset, and range queries on encrypted data, 4th Theory of Cryptography Conference (TCC) 2007, LNCS, 6597, (2007), Springer Berlin, Amsterdam, Netherlands · Zbl 1156.94335
[6] Boyen, X.; Waters, B., Anonymous hierarchical identity-based encryption (without random oracles), Advances in Cryptology - CRYPTO, Santa Barbara, California, USA, LNCS, 4117, (2006), Springer, Berlin · Zbl 1161.94390
[7] Byun, J.; Rhee, H.; Park, H. A.; Lee, D., Off-line keyword guessing attacks on recent keyword search schemes over encrypted data, Secure Data Management (SDM) 2006, Seoul, Korea, LNCS, 4165, (2006), Springer, Berlin
[8] Byun, J. W.; Lee, D. H., On a security model of conjunctive keyword search over encrypted relational database, J. Syst. Softw., 84, 1364-1372, (2011)
[9] Cao, N.; Wang, C.; Li, M.; Ren, K.; Lou, W., Privacy-preserving multi-keyword ranked search over encrypted cloud data, IEEE Trans. Parallel Distrib. Syst., 25, 1, 222-233, (2014)
[10] Chen, R.; Mu, Y.; Yang, G.; Guo, F.; Wang, X., A new general framework for secure public key encryption with keyword search, 20th Australasian Conference on Information Security and Privacy (ACISP 2015), Brisbane, QLD, Austrlia, LNCS, 9144, (2015), Springer, Berlin · Zbl 1358.94060
[11] Fang, L.; Susilo, W.; Ge, C.; Wang, J., Public key encryption with keyword search secure against keyword guessing attack without random oracle, Inf. Sci., 238, 221-241, (2013) · Zbl 1321.94057
[12] Fuhr, T.; Paillier, P., Decryptable searchable encryption, Provable Security 2007, Wollongong, Australia, LNCS, 4784, (2007), Springer, Berlin · Zbl 1138.94363
[13] Huang, K.; Tso, R.; Chen, Y.-C.; Rahman, S. M.M.; Almogren, A.; Alamri, A., PKE-AET: public key encryption with authorized equality test, Comput. J., (2015)
[14] Hwang, Y.; Lee, P., Public key encryption with conjunctive keyword search and its extension to a multi-user system, Pairing-Based Cryptography (Pairing) 2007, Tokyo, Japan, LNCS, 4575, (2007), Springer, Berlin · Zbl 1151.68405
[15] Ibraimi, L.; Nikova, S.; Hartel, P.; Jonker, W., Public-key encryption with delegated search, Applied Cryptography and Network Security(ACNS) 2011, Nerja, Spain, LNCS, 6715, (2011), Springer, Berlin · Zbl 1311.94086
[16] Jeong, I. R.; Kwon, J. O.; Hong, D.; Lee, D. H., Constructing PEKS schemes secure against keyword guessing attacks is possible?, Comput. Commun., 32, 2, 394-396, (2009)
[17] Katz, J.; Sahai, A.; Waters, B., Predicate encryption supporting disjunctions, polynomial equations, and inner products, J. Cryptol., 26, 191-224, (2013) · Zbl 1279.94091
[18] Lauter, K., The advantages of elliptic curve cryptography for wireless security, IEEE Trans. Wirel. Commun., 11, 1, 62-67, (2004)
[19] Liu, C.; Zhu, L.; Wang, M.; Tan, Y.a., Search pattern leakage in searchable encryption: attacks and new construction, Inf. Sci., 265, 176-188, (2014)
[20] B. Lynn, Pairing based cryptography-benchmarks. http://crypto.stanford.edu/pbc/times.html (accessed 2014).
[21] Ma, S.; Huang, Q.; Zhang, M.; Yang, B., Efficient public key encryption with equality test supporting flexible authorization, IEEE Trans. Inf. Foren. Sec., 10, 3, 458-470, (2015)
[22] Ma, S.; Zhang, M.; Huang, Q.; Yang, B., Public key encryption with delegated equality test in a multi-user setting, Comput. J., 58, 4, 986-1002, (2015)
[23] Nishioka, M., Perfect keyword privacy in peks system, 6th International Conference on Provable Security (ProvSec 2012), Chengdu, China, LNCS, 7496, (2012), Springer, Berlin · Zbl 1303.94094
[24] Orencik, C.; Selcuk, A.; Savas, E.; Kantarcioglu, M., Multi-keyword search over encrypted data with scoring and search pattern obfuscation, Int. J. Inf. Sec., 1-19, (2015)
[25] Park, J. H.; Lee, D. H., Anonymous HIBE: compact constructiion over prime-order groups, IEEE Trans. Inf. Theory, 59, 4, 2531-2541, (2013) · Zbl 1364.94563
[26] Rhee, H. S.; Susilo, W.; Kim, H.j., Secure searchable public key encryption scheme against keyword guessing attack, IEICE Electron. Express, 6, 5, 237-243, (2009)
[27] Seo, J. H.; Kobayashi, T.; Ohkubo, M.; Suzuki, K., Anonymous hierarchical identity-based encryption with constant size ciphertexts, 12th International Conference on Practice and Theory in Public Key Cryptography (PKC 2009), Irvine, CA, USA, LNCS, 5443, (2009), Springer, Berlin · Zbl 1227.94064
[28] Shi, E.; Waters, B., Delegating capabilities in predicate encryption systems, 35th International Colloquium Automata Language Programming (ICALP), Reykjavik, Iceland, LNCS, 5126, (2008), Springer, Berlin · Zbl 1155.94385
[29] Shi, J.; Lai, J.; Li, Y.; Deng, R. H.; Weng, J., Authorized keyword search on encrypted data, 19th European Symposium on Research in Computer Security (ESORICS 2014), Wroclaw, Poland, LNCS, 8712, (2014), Springer, Berlin
[30] Sun, W.; Lou, W.; Hou, Y. T.; Li, H., Privacy-preserving keyword search over encrypted data in cloud computing, Secure Cloud Computing (Springer, Berlin), 189-212, (2014)
[31] Tang, Q., Towards public key encryption scheme supporting equality test with fine-grained authorization, 16th Australasian Conference on Information Security and Privacy (ACISP 2011), Melbourne, Australia, LNCS, 6812, (2011), Springer, Berlin · Zbl 1271.94024
[32] Tang, Q., Public key encryption schemes supporting equality test with authorization of different granularity, Int. J. Appl. Cryptogr., 2, 4, 304-321, (2012) · Zbl 1271.94025
[33] Tang, Q., Public key encryption supporting plaintext equality test and user-specified authorization, Sec. Commun. Netw., 5, 12, 1351-1362, (2012)
[34] Xu, P.; Jin, H.; Wu, Q.; Wang, W., Public-key encryption with fuzzy keyword search: a provably secure scheme under keyword guessing attack, IEEE Trans. Comput., 62, 2266-2277, (2013) · Zbl 1365.94466
[35] Wang, B.; Yu, S.; Lou, W.; Hou, Y., Privacy-preserving multi-keyword fuzzy search over encrypted data in the cloud, 33rd Annual IEEE International Conference on Computer Communication (INFOCOM 2014), Toronto, Canada, (2014), IEEE
[36] Yang, G.; Tan, C.; Huang, Q.; Wong, D. S., Probabilistic public key encryption with equality test, The Cryptographers’ Track at the RSA conference 2010 (CT-RSA 2010), San Francisco, CA, USA, LNCS, 5985, (2010), Springer, Berlin · Zbl 1271.94028
[37] Yau, W.; Heng, S.; Goi, B. M., Off-line keyword guessing attacks on recent public key encryption with keyword search schemes, Autonomic and Trusted Computing (ATC) 2008, Oslo, Norway, LNCS, 5060, (2008), Springer, Berlin
[38] Yoshitomi, M.; Takagi, T.; Kiyomoto, S.; Tanaka, T., Efficient implementation of the pairing on mobile phones using BREW, Cryptology ePrint Archive, Report 2007/340, (2007)
[39] Yu, Y.; Ni, J.; Yang, H.; Mu, Y.; Susilo, W., Efficient public key encryption with revocable keyword search, Sec. Commun. Netw., 7, 2, 466-472, (2014)
[40] Zheng, Q.; Xu, S.; Ateniese, G., VABKS: verifiable attribute-based keyword search over outsourced encrypted data, 33rd Annual IEEE International Conference on Computer Communication (INFOCOM 2014), Toronto, Canada, (2014), IEEE
This reference list is based on information provided by the publisher or from digital mathematics libraries. Its items are heuristically matched to zbMATH identifiers and may contain data conversion errors. It attempts to reflect the references listed in the original paper as accurately as possible without claiming the completeness or perfect precision of the matching.