Browse > Article
http://dx.doi.org/10.3837/tiis.2019.09.023

Public Key Encryption with Equality Test for Heterogeneous Systems in Cloud Computing  

Elhabob, Rashad (School of Information and Software Engineering, University of Electronic Science and Technology of China)
Zhao, Yanan (School of Information and Software Engineering, University of Electronic Science and Technology of China)
Sella, Iva (School of Information and Software Engineering, University of Electronic Science and Technology of China)
Xiong, Hu (School of Information and Software Engineering, University of Electronic Science and Technology of China)
Publication Information
KSII Transactions on Internet and Information Systems (TIIS) / v.13, no.9, 2019 , pp. 4742-4770 More about this Journal
Abstract
Cloud computing provides a broad range of services like operating systems, hardware, software and resources. Availability of these services encourages data owners to outsource their intensive computations and massive data to the cloud. However, considering the untrusted nature of cloud server, it is essential to encrypt the data before outsourcing it to the cloud. Unfortunately, this leads to a challenge when it comes to providing search functionality for encrypted data located in the cloud. To address this challenge, this paper presents a public key encryption with equality test for heterogeneous systems (PKE-ET-HS). The PKE-ET-HS scheme simulates certificateless public encryption with equality test (CLE-ET) with the identity-based encryption with equality test (IBE-ET). This scheme provides the authorized cloud server the right to actuate the equivalence of two messages having their encryptions performed under heterogeneous systems. Basing on the random oracle model, we construct the security of our proposed scheme under the bilinear Diffie-Hellman (BDH) assumption. Eventually, we evaluate the size of storage, computation complexities, and properties with other related works and illustrations indicate good performance from our scheme.
Keywords
Cloud computing; searchable encryption; equality test; heterogeneous systems;
Citations & Related Records
연도 인용수 순위
  • Reference
1 N. Fernando, S. W. Loke, W. Rahayu, "Mobile cloud computing: A survey," Future generation computer systems, 29 (1), 84-106, 2013.   DOI
2 A. Botta, W. De Donato, V. Persico, A. Pescape, "Integration of cloud computing and internet of things: a survey," Future Generation Computer Systems, 56, 684-700, 2016.   DOI
3 Q. Yan, F. R. Yu, Q. Gong, J. Li, "Software-defined networking (sdn) and distributed denial of service (ddos) attacks in cloud computing environments: A survey some research issues, and challenges," IEEE Communications Surveys & Tutorials, 18(1), 602-622, 2016.   DOI
4 H. Takabi, J. B. Joshi, G.-J. Ahn, "Security and privacy challenges in cloud computing environments," IEEE Security & Privacy, 8(6), 24-31, 2010.   DOI
5 H. Hong, Z. Sun, "Sharing your privileges securely: a key-insulated attribute based proxy re-encryption scheme for iot," World Wide Web, 21(3), 595-607, 2018.   DOI
6 H. Hong, Z. Sun, "Achieving secure data access control and efficient key updating in mobile multimedia sensor networks," Multimedia Tools and Applications, 77(4), 4477-4490, 2018.   DOI
7 H. Hong, Z. Sun, "A key-insulated ciphertext policy attribute based signcryption for mobile networks," Wireless Personal Communications, 95(2), 1215-1228, 2017.   DOI
8 H. Hong, X. Liu, Z. Sun, "A fine-grained attribute based data retrieval with proxy re-encryption scheme for data outsourcing systems," Mobile Networks and Applications, 1-6, 2018.
9 G. Yang, C. H. Tan, Q. Huang, D. S. Wong, "Probabilistic public key encryption with equality test," in Proc. of Cryptographers Track at the RSA Conference, Springer, pp. 119-131, 2010.
10 D. Boneh, G. Di Crescenzo, R. Ostrovsky, G. Persiano, "Public key encryption with keyword search," in Proc. of International Conference on the Theory and Applications of Cryptographic Techniques, Springer, pp. 506-522, 2004.
11 S. Ma, Q. Huang, M. Zhang, B. Yang, "Efficient public key encryption with equality test supporting flexible authorization," IEEE Transactions on Information Forensics and Security, 10(3), 458-470, 2015.   DOI
12 Q. Tang, "Public key encryption supporting plaintext equality test and user-specified authorization," Security and Communication Networks, 5(12), 1351-1362, 2012.   DOI
13 S. Ma, M. Zhang, Q. Huang, B. Yang, "Public key encryption with delegated equality test in a multi-user setting," The Computer Journal, 58(4), 986-1002, 2014.   DOI
14 K. Huang, R. Tso, Y.-C. Chen, S. M. M. Rahman, A. Almogren, A. Alamri, "Pke-aet: public key encryption with authorized equality test," The Computer Journal, 58(10), 2686-2697, 2015.   DOI
15 Y. Xu, M. Wang, H. Zhong, J. Cui, L. Liu, V. N. Franqueira, "Verifiable public key encryption scheme with equality test in 5g networks," IEEE Access 5, 12702-12713, 2017.   DOI
16 S. Ma, "Identity-based encryption with outsourced equality test in cloud computing," Information Sciences, 328, 389-402, 2016.   DOI
17 H. T. Lee, S. Ling, J. H. Seo, H. Wang, "Semi-generic construction of public key encryption and identity-based encryption with equality test," Information Sciences, 373, 419-440, 2016.   DOI
18 L. Wu, Y. Zhang, K.-K. R. Choo, D. He, "Efficient and secure identity-based encryption scheme with equality test in cloud computing," Future Generation Computer Systems, 73, 22-31, 2017.   DOI
19 S. S. Al-Riyami, K. G. Paterson, "Certificateless public key cryptography," Asiacrypt, Springer, Vol. 2894, pp. 452-473, 2003.
20 L. Wu, Y. Zhang, K.-K. R. Choo, D. He, "Efficient identity-based encryption scheme with equality test in smart city," IEEE Transactions on Sustainable Computing, 3(1), 44-55, 2018.   DOI
21 H. Qu, Z. Yan, X.-J. Lin, Q. Zhang, L. Sun, "Certificateless public key encryption with equality test," Information Sciences, 462, 76-92, 2018.   DOI
22 M. Abdalla, M. Bellare, D. Catalano, E. Kiltz, T. Kohno, T. Lange, J. Malone-Lee, G. Neven, P. Paillier, H. Shi, "Searchable encryption revisited: Consistency properties, relation to anonymous ibe, and extensions," Crypto, Springer, 2(3), 350-391, 2008.
23 Q. Tang, "Towards public key encryption scheme supporting equality test with fine-grained authorization," in Proc. of Australasian Conference on Information Security and Privacy, Springer, pp. 389-406, 2011.
24 Q. Tang, "Public key encryption schemes supporting equality test with authorization of different granularity," International journal of applied cryptography, 2(4), 304-321, 2012.   DOI
25 D. Boneh, M. Franklin, "Identity-based encryption from the weil pairing," in Proc. of Annual International Cryptology Conference, Springer, pp. 213-229, 2001.
26 B. Lynn et al., "The pairing-based cryptography library," 2006. [Online]. Available: crypto.stanford.edu/pbc/[Mar. 27, 2013]