Abstract
In the cloud, uploading encrypted data is the most effective way to ensure that the data are not leaked. However, data access control is still an open problem in cloud storage systems. To provide an authorization mechanism to limit the comparison of a user’s ciphertexts with those of another, public key encryption supporting the equality test with four flexible authorizations (PKEET-FA) is presented. Subsequently, more functional identity-based encryption supporting the equality test (IBEET-FA) further combines identity-based encryption with flexible authorization. The bilinear pairing has always been intended to be replaced due to the high computational cost. Hence, in this paper, we use general trapdoor discrete log groups to construct a new and secure IBEET-FA scheme, which is more efficient. The computational cost for the encryption algorithm in our scheme was reduced to 43% of that of the scheme of Li et al. In Type 2 and 3 authorization algorithms, the computational cost of both was reduced to 40% of that of the scheme of Li et al. Furthermore, we give proof that our scheme is secure against one-wayness under the chosen identity and chosen ciphertext attacks (OW-ID-CCA), and indistinguishable against chosen identity and chosen ciphertext attacks (IND-ID-CCA).
1. Introduction
With the application of the Internet increasingly spreading, people have more extensive storage and computing requirements for cloud servers. Users make full use of cloud servers, allowing cloud servers to help them in storing and processing data, reducing the user’s storage burden and computing overhead. Users in different regions can upload data onto and download data from a server, which provides convenience for users to share data. However, servers are also vulnerable to some attacks. If users store their data unencrypted in the cloud server, attackers or malicious internal administrators may access the data stored by users. The solution is for every user to upload encrypted data onto the cloud server. Previous classical encryption schemes cannot realize direct searches or calculations in the ciphertext.In a searchable encryption scheme [1], the ciphertext and trapdoor for retrieval need to be obtained with the same public and private key pair.
A novel PKEET scheme [2] was first proposed by Yang et al. in 2010. In this scheme, users can test whether ciphertexts encrypted by different public keys contain the same plaintext without decrypting the ciphertext, which avoids the previous limitations of searchable encryption. However, in the scheme, anyone can test the encrypted data, which can lead to data leakage. Taking into account better meeting practical applications, Tang proposed a fine-grained equality test scheme [3] that can achieve fine-grained authorization by sending tokens to a proxy. The equality test of flexible authorization for more scenarios was proposed in [4], in which there were different authorizations to meet the different needs of users, and different authorization types corresponded to different test permissions. It can not only perform the equivalence testing of ciphertext that was encrypted without the same public key, but also designate testers, which better protects the privacy of the data. On this basis, to avoid the public key infrastructure (PKI), a functional and efficient IBEET-FA scheme [5] is proposed as a new concept, replacing PKE with IBE. The first IBE scheme [6] replaced the public key with user-related identity information, and the private key is calculated and provided by a trusted third party. No need for a public key means that the difficulty of key management is eliminated. A new IBE scheme [7] using the general trapdoor discrete logarithm group was proposed that reduces the computational cost compared to that when using bilinear pairs. IBEET-FA [5] is based on bilinear pairing.
1.1. Our Contribution
Bilinear pairing is computationally expensive, and to reduce the computational cost, we have attempted to replace pairing with discrete logarithms. We reconstructed an existing concept with a different tool, namely, reconstructing the IBEET-FA scheme with discrete logarithms. This can achieve more efficient searches in ciphertexts encrypted by different public keys, and maintain the nature of flexible authorization in which different authorizations correspond to different permissions. A public key infrastructure is not required.
We first defined the scheme and its correctness. Subsequently, a specific scheme IBEET-FA without paring was constructed, and the scheme was proven to be correct. Our scheme is communicationally efficient, and it has a small public key and ciphertext. The scheme is computationally efficient, as the Aut-1, Aut-2, and Aut-3 authorization algorithms and testing algorithms in it all have a small computational overhead.
We then define two security models for the scheme, and two types of adversaries, Adv-I and Adv-II. Our IBEET-FA without a pairing scheme achieved OW-ID-CCA security for Aut- ( = 1, 2, 3) against Adv-I on the basis of the CDH assumption in the random oracle model. The IBEET-FA without a pairing scheme achieved IND-ID-CCA security for Aut- ( = 1, 2, 3) against Adv-II on the basis of the DDH assumption.
1.2. Related Works
A new concept of public key encryption with keyword search (PEKS) was proposed by Boneh et al. [1] in 2004 that allows for direct keyword searches in ciphertext without decrypting the ciphertext. A user can generate the corresponding trapdoor of some keyword by using its private key and perform a keyword search in the ciphertexts with the trapdoor. Subsequently, many related variants were proposed [8,9,10]. Bellare et al. [11] proposed a deterministic PKE scheme. Yang et al. [2] devised a ciphertext-based equality test scheme using bilinear groups for searchable and classified encrypted data. However, in that scheme, anyone could perform the test, so it is easy for it to cause data leakage, which is not conducive to data privacy. Tang [3] presented a new method where two users could authorize a proxy to execute equality calculation on their encrypted message by issuing tokens. Tang [12] gave a new PKE in a two-proxy model supporting fine-grained authorization (FG-PKEET) in which the two proxies were required to cooperate to complete the equality test. Subsequently, Tang [13] proposed the construction of an all-or-nothing PKEET (AoN-PKEET).
A new scheme of PKE with a delegated equality test (PKE-DET) was proposed by Ma et al. in [14]; in a multiuser model, only the delegated party can perform the equality test. Wu et al. [15] introduced a new equality test concept that could achieve security against insider attacks. Ma [16] proposed a variant of PKEET in which a cloud server could directly execute the equality test on the ciphertexts of the specified user, realizing the security of the cloud database application. In [17], PKE-AET offered a new idea regarding two different kinds of warrants, namely, receiver warrants and cipher warrants. After a tester receives a receiver warrant from some receiver, the tester can perform the equality test on any of the receiver’s ciphertext; in the second case, after a tester receives a cipher warrant associated with some ciphertext from some receiver, the tester can just execute an equality test on that ciphertext. Huang et al. [18] presented a ciphertext-binded authority (CBA) PKEET scheme. CBAs are only valid for specific ciphertexts, and they are invalid for other ciphertexts encrypted by the same public key. The concept of the filtered equality test (FET) was proposed by Huang et al. [19] where the receiver selects a set of messages and generates the corresponding warrant. After a user receives the warrant, if the plaintext corresponding to the ciphertext is in the message set, they can perform an equality test on the recipient’s ciphertext. Huang et al. [20] proposed a PKE-FET scheme in which FET was also applied to construct searchable encryption. The key policy-attribute-based encryption with an equality test scheme was proposed by Zhu et al. in [21]. After the flexible scheme, a ciphertext policy-attribute-based encryption scheme was presented by Wang et al. [22] that also supported the function of the equality test.
A new authorization mechanism for efficient PKEET-FA was proposed by Ma et al. [4], which can more effectively achieve user privacy protection. The scheme was based on bilinear pairing, Lin et al. [23] made improvements on this basis and proposed a novel PKEET-FA scheme, Bilinear pairings were not used in this scheme. This protocol used a quadratic curve to do the equality test, Zhu et al. [24] used a simpler straight line for the equality test. A new concept of IBEET by combining two existing concepts PKEET and IBE was given by Ma et al. [25]. A new IBEET-FA scheme was proposed in [5]. Users can directly execute equality tests on the ciphertext, eliminating the need for complex key management.
Duong et al. [26] proposed a new PKEET scheme based on ideal lattices and a scheme based on integer lattices, both schemes can achieve CCA2-security. Ref. [27] introduced the trends in multimedia forensics, and many deep-learning-based techniques. In [28], lSusilo et al. presented a novel concept of public key encryption with multi-ciphertext equality test (PKE-MET), which enables the cloud server to perform equality tests among multiple ciphertexts. A new primitive of identity-based encryption with equality test and datestamp-based authorization mechanism (IBEET-DBA) was proposed by Lin et al. [29], in which the data owner could control the valid period of trapdoor by using datestamp. Deverajan et al. [30] presented public key encryption with equality test based on discrete logarithm problem (DLP). Considering the possible attacks on trapdoors given to cloud servers and the different computing power of the entities, Vaanchig et al. [31] introduced a notion of secure-channel-free IBEET (SCF-IBEET).
1.3. Organization
We organize the remainder of the paper as follows. The definitions of Trapdoor Discrete Log Groups and Decision Diffie–Hellman Problem are given in Section 2. Then, we give the system model, the definitions of IBEET-FA and the security model in Section 3. In Section 4, we propose a new IBEET-FA scheme without pairing. In Section 5, the security analysis of our scheme will be given. In Section 6, we will show the complexity comparison of our scheme and other related schemes. In the last section, some conclusions will be given.
2. Preliminaries
2.1. Trapdoor Discrete Log (TDL) Groups
Definition 1.
A TDL group generator consists of algorithms TDLGen and SolveDL:
- : Given security parameter k as the input, the algorithm returns a tuple where T is used to denote the trapdoor, q is used to denote the prime order, g is used to denote a random generator, and G is used to denote a group.
- : Given the inputs of a security parameter k, denoting a tuple and h denoting a group element, the algorithm outputs , and holds.
2.2. Computational Diffie–Hellman (CDH) Problem
Definition 2.
Let q be the prime order of group G, generator g is gotten from the running result of algorithm in the , let be a tuple in G, for . It is intractable to compute . is an adversary, in probability polynomial time, the advantage of adversary to solve the CDH problem is
2.3. Decision Diffie–Hellman (DDH) Problem
Definition 3.
Let q be the prime order of group G, generator g is gotten from the running result of algorithm in the , let , be two tuples in G, for . It is difficult to distinguish the two tuples in this computational relationship. is an adversary, in probability polynomial time, the advantage of to solve the DDH problem is
3. System Model and Definition
In Section 3.1 and Section 3.2, we give the system model and the definition of IBEET-FA, similarly in [5]. In Section 3.3, we give the security model of IBEET-FA.
3.1. System Model
In our defined IBEET-FA scheme, we give four entities: a cloud server, a trusted third party, and two users labeled as i and j. The trusted third party generates system parameters for users and cloud service. User i and user j encrypt their data with their public key, and store ciphertext in the cloud server, and the cloud server is authorized to do equality tests on stored ciphertext, but the server does not have the ability to decrypt them. We present the IBEET-FA system model in Figure 1.
Figure 1.
IBEET-FA system model.
3.2. Definition of IBEET-FA
Definition 4.
Our IBEET-FA scheme consists of four algorithms:
- : Taken security parameter k as the input, the public parameter and the master secret key will be gotten from the running result of the algorithm.
- : Given label i, master secret key , and public parameter as input, the algorithm returns the secret key .
- : Given the inputs of user i, a message M and public parameter , the algorithm returns the ciphertext .
- : Given label i, a private key , a ciphertext and public parameter as inputs, a message M will be gotten from the running result of the algorithm, or returns an error symbol ⊥.
User i has the public-secret key pair , corresponding encrypted data is , User j has the public-secret key pair , corresponding encrypted data is . They have four types of authorization, corresponding to four different algorithms and four different algorithms. algorithm is used to generate trapdoors for users, and the cloud service runs procedure to test whether or not two different encrypted data contain the same message.
Aut-1:
- : Given user i and i’s secret key as inputs, the authorization procedure returns a trapdoor .
- : Given the inputs of i’ciphertext , i’trapdoor , j’ciphertext and j’trapdoor , the test procedure returns 1 if two ciphertexts contain the same message, otherwise returns 0.
Aut-2:
- : Given the inputs of user i’private key and a ciphertext , the authorization procedure outputs a trapdoor .
- : Given the inputs of i’ciphertext , i’trapdoor , j’ciphertext and j’trapdoor , the test procedure returns 1 if two ciphertexts contain the same plaintext, otherwise returns 0.
Aut-3:
- : Given the inputs of user i’private key , i’ciphertext , and j’ciphertext , the authorization procedure outputs a trapdoor .
- : Given the inputs of i’ciphertext , i’trapdoor , j’ciphertext and j’trapdoor , the test procedure returns 1 if two ciphertexts contain the same plaintext, otherwise returns 0.
Aut-4:
- : Given the inputs of user i’private key and ciphertext , the authorization procedure returns a trapdoor .
- : Given user j and j’s secret key as inputs, the authorization procedure returns a trapdoor .
- : Given the inputs of i’ciphertext , i’trapdoor , j’ciphertext and j’trapdoor , the test procedure returns 1 if two ciphertexts contain the same message, otherwise returns 0.
Definition 5.
(Correctness): If for any , , , the following conditions can be satisfied, we say an IBEET-FA scheme is correct.
- For any possible plaintext M in the plaintext space, , all equations hold.
- For any possible ciphertext of user i and any possible ciphertext of user j, if Decrypt:Aut-1: For two trapdoors of , , the following equality always holds thatAut-2: For two trapdoors of , , the following equality always holds thatAut-3: For two trapdoors of , , the following equality always holds thatAut-4: For two trapdoors of , , the following equality always holds that
- For any possible ciphertext of user i and any possible ciphertext of user j, if Decrypt, where be a negligible function about k:Aut-1: For two trapdoors of , , the following equality always holds thatAut-2: For two trapdoors of , , the following equality always holds thatAut-3: For two trapdoors of , , the following equality always holds thatAut-4: For two trapdoors of , , the following equality always holds that
3.3. Security Model
According to the nature of our scheme, we use the IBEET-FA security models defined in [5]. Since Aut-4 is a combination of one user authorization way in Aut-1 and one user authorization way in Aut-2, we omit Aut-4 authorization queries for simplicity. Adversaries are only allowed to query for Aut- ( = 1, 2, 3). We define two kinds of adversaries for the security model of our IBEET-FA scheme:
- Adv-I: For Aut- ( = 1, 2, 3), with Aut- trapdoor information, the adversary can not get the plaintext from the challenge ciphertext.
- Adv-II: For Aut- ( = 1, 2, 3), without Aut- trapdoor information, the adversary can not know the challenge ciphertext is from which plaintext.
Under chosen ciphertext and chosen identity attacks, We now define the one-wayness security (OW-ID-CCA) against Adv-I for Aut- ( = 1, 2, 3) as follows:
: Let the receiver have index t (), and assume is a Adv-I. Between the challenger and the adversary , the game goes as follows:
- : Challenger firstly picks k as a security parameter, then gets public parameter by calling algorithm, sends to .
- : Allows to query for polynomially many times as follows.
- Key retrieve queries: calls algorithm and sends to . call the algorithm and send the result to A
- Decryption queries: runs algorithm and returns M(which might be ⊥) to .
- Authorization queries: For three types of authorization Aut- ( = 1, 2, 3),
- (a)
- i as input, sends to .
- (b)
- as input, sends to .
- (c)
- as input, sends to .
- : Adversary picks a target identity t which has not been queried in extract queries, and sends it to . Then chooses a message randomly, gets as the challenge ciphertext and sends it to .
- : continues issuing the same query as Phase 1. However, t can not be queried in this phase and can not be queried in a decryption query.
- : returns a message , if means wins the game.
We give the advantage definition of in the Game I as
Definition 6.
If the advantage is negligible for any probabilistic polynomial-time Adv-I , We say the IBEET-FA scheme is OW-ID-CCA secure for three types of authorization Aut-γ (γ = 1, 2, 3).
: Let the recipient’s identity be t (), and Sets as an Adv-II adversary. Between the challenger and the adversary the game goes as follows:
- : Challenger firstly picks k as a security parameter, then gets public parameter by calling algorithm, and sends to .
- : Allows to issue polynomially times queries as in Game I.
- : Adversary sends to Challenger two messages , , and a target identity t, t can not be allowed to appear in extract query or Aut-1 authorization query phase. picks a bit randomly, uses encryption algorithm to get challenge ciphertext , then sends to .
- : Allows to continue issuing queries as Phase 1, but there are some restrictions as follows:
- i can not be queried in the Key retrieve query or Aut-1 authorizations queries;
- can not be queried in the decryption query;
- can not be queried in the authorizations query.
- : returns a bit , when holds, wins in the game.
In Game II, the advantage definition of is
Definition 7.
If the advantage is negligible for any probabilistic polynomial-time Adv-II , We say the IBEET-FA scheme is IND-ID-CCA secure for three types of authorization Aut-γ (γ = 1, 2, 3).
4. Our Proposed IBEET-FA Scheme
In our IBEET-FA scheme, we use the advantages of the PKEET-FA scheme and IBE without pairing scheme.
4.1. The Proposed Scheme
- : Here k is a security parameter, and it is the size of plaintext messages, the algorithm works as follows:
- This algorithm calls the TDLGen algorithm of the TDL generator, then gets a tuple where T is the trapdoor, G is a group, g is a random generator, and q is the prime order.
- Picks some secure hash functions: , , , and .Gets the master secret key , the public parameter .
- : Choosing label i, the public parameter and master secret key as input, then calls SolveDL algorithm. as input, get a value such that . Furthermore, calls SolveDL algorithm again taking as input to get a value such that . Then outputs the secret key .
- : Taking a plaintext M, public parameter and user i as input, the algorithm works as follows:
- Compute one point .
- O is the origin, use point P, O to construct a ray with O as the endpoint.
- Choose a non zero point , then compute .
- Choose at random , then computeOutput the ciphertext .
- : Taking label i, a ciphertext , private key and public parameter as input, this algorithm computes and . Obtain point P as in algorithm and obtain with P, O as in algorithm. if hold, then returns M; and returns an error symbol ⊥ otherwise.
Two users are represented as and , selecting and as the randomness used in computing and . Correspondingly, compute ciphertext and ciphertext ) of and .
Aut-1:
- : This authorization procedure returns a trapdoor .
- : The test procedure performs the following calculationsIt returns 1 if , or returns 0 otherwise.
Aut-2:
- : This authorization procedure outputs a trapdoor .
- : This test procedure computesIt returns 1 if , or returns 0 otherwise.
Aut-3:
- : This authorization procedure recovers with , then outputs a trapdoor
- : This test procedure computesIt returns 1 if , or returns 0 otherwise.
Aut-4:
- : This authorization procedure returns a trapdoor .
- : This authorization procedure returns a trapdoor .
- : This test procedure computesIt returns 1 if , or returns 0.
4.2. Correctness
Theorem 1.
By definition 2, the correctness of the above IBEET-FA scheme is proven.
Proof of Theorem 1.
We now prove our IBEET-FA scheme meets all correctness requirements.
- The first requirement is satisfied obviously.
- According to the second requirement, for any , , , , all the following equations hold.
- Aut-1: Given , , get the following:Because point is taken from the ray corresponding to , point is taken from the ray corresponding to , if means and are taken from the same ray. So holds if .
- Aut-2: Givenandget the following:Because point is taken from the ray corresponding to , point is taken from the ray corresponding to , if means and are taken from the same ray. So holds if .
- Aut-3: Givenandget the following:Because point is taken from the ray corresponding to , point is taken from the ray corresponding to , if means and are taken from the same ray. So , i.e., holds if .
- Aut-4: Given , , get the following:Because point is taken from the ray corresponding to , point is taken from the ray corresponding to , if means and are taken from the same ray. So holds if .
- Now we prove the third condition holds.is a ray passing through point with O as its endpoint, is a ray passing through with O as its endpoint. Point is taken from the ray , and point is taken from the ray .
- Aut-1: If , we can get that , that is, point and point are taken from the same ray with O as the end point. For , is negligible, then we get that is also negligible for .
- Aut-2: If , we can get that , that is, point and point are taken from the same ray with O as the end point. For , is negligible, then we get that is also negligible.
- Aut-3: If , we can get that , that is, . For , is negligible, we get that is also negligible for .
- Aut-4: If , we can get that , that is, point and point are taken from the same ray with O as the end point. For , is negligible, we get that is also negligible for .
□
5. Security Analysis
We will prove two kinds of security against different adversaries in this section. For this purpose, we design several related games to connect the scheme security and the hardness problems. Suppose is a polynomial-time adversary, allowing to do at most , , , , , times of queries to hash oracles , , , , , ,respectively, times key generation queries, times decryption queries, times trapdoor queries. Challenger controls oracles and answers the queries of adversaries. , , , , , stand for hash lists.
5.1. OW-ID-CCA Security Against Adv-I
Theorem 2.
Based on CDH assumption, in the random oracle model our presented IBEET-FA scheme is OW-ID-CCA secure against Adv-I for Aut-γ (γ = 1, 2, 3) authorization.
Proof of Theorem 2.
The change is that is replaced by a random R. We can see that is random in . If has been queried in , we call it event E. If has not been queried, it is difficult for to separate and . We get that
then have
Obviously, is ignorable if the CDH problem is difficult.
Compared to , in is changed by random . R is a random string, we can konw that is also a random string. So it is difficult for to separate and . We have that
Similarly, if CDH problem is difficult, is ignorable.
We design several related games to prove OW-ID-CCA security against Adv-I . Let P[] present the probability of breaking game i, where .
- Game1:
- : The challenger outputs public parameter , the master secret key .
- : Allows to do the following queries.
- 1.
- Hash queries: Suppose queries at most , , , , , times to hash oracles , , , , , , respectively.
- (a)
- , : Set original empty lists (resp.). For an identity i, the oracle picks (resp.) randomly, computes (resp.) and records the tuple (resp.) on hash list (resp.). (resp.) is returned to .
- (b)
- : Set original empty lists . For an input , the oracle picks a string randomly and records the tuple on hash list . is returned to .
- (c)
- , : Set original empty lists . For an input , the oracle picks randomly and records the tuple on hash list . is returned to .
- (d)
- : Set original empty lists . For an input , the oracle picks a string randomly and records the tuple on hash list . is returned to .
- 2.
- Key retrieve queries: For an identity i, challenger invokes hash oracles , to get hash values , , then runs algorithm to get the secret key . It returns to .
- 3.
- Decryption queries: For an identity i, ciphertext , challenger invokes key retrieve queries to obtain the secret key , then uses to call algorithm to obtain the message (which might be ⊥). It returns (or ⊥) to .
- 4.
- Authorization queries: For Aut- ( = 1, 2, 3),
- (a)
- : i as the input, runs algorithm with , then returns to .
- (b)
- : as the input, runs algorithm with , then returns to .
- (c)
- : as the input, runs algorithm with , then returns to .
- : Adversary submits to an identity t, and t has not been queried in previous extract query, randomly selects a message , and gets with the following equations.where the point is randomly taken from the ray passing through the point , and . Then, the challenge ciphertext is sent to .
- : Allows to issue the same type query as in Phase 1. However, in the key retrieve queries, t can not be allowed to query; and in the decryption queries, can not be queried.
- : returns a message , if , means in the game wins. The probability of adversary winning the game is:
- Game2:
- It is almost equivalent to Game 1, the modified parts are as follows:
- Game3:
- It is almost equivalent to Game2, the modified parts are as follows:
From all the formulas obtained above, we derive the following formula
We can get a conclusion: when the CDH problem is intractable, our new IBEET-FA scheme can achieve IND-ID-CCA security against Adv-I. □
5.2. IND-ID-CCA Security Against Adv-II
Theorem 3.
Based on DDH assumption, in the random oracle model our presented IBEET-FA scheme is IND-ID-CCA secure against Adv-II for Aut-γ (γ = 1, 2, 3) authorization.
Proof
(Proof of Theorem 3). If such an adversary exists who could attack the IND-ID-CCA security of this scheme, we then can get an algorithm to solve the DDH problem in polynomial time with not negligible advantage. For Adv-II , we design the following game to prove the IND-ID-CCA security. The probability of winning the game is expressed as .
For , given two tuples , computes system parameters and sends to . For the queries of , replies as following.
- : For , algorithm generates n key pairs , where sets .
- : Allows algorithm to issue four types of queries as follows.
- 1.
- Hash queries:
- (a)
- , : Work in the same way as in .
- (b)
- : Works in the same way as in .
- (c)
- , : Works in the same way as in .
- (d)
- : Works in the same way as in .
- 2.
- Key retrieve queries: Given an identity i, searches tuple and tuple in list and list , sends to when holds. Otherwise, returns ⊥ to .
- 3.
- Decryption queries: For identity i and a query ciphertext , challenger searches tuple in list , and computes . If exists R, making equation true, returns M to . Otherwise, returns ⊥ to .
- 4.
- Authorization queries: For Aut- ( = 1, 2, 3),
- (a)
- : i as the input, challenger calls algorithm with , then sends to .
- (b)
- : as the input, challenger calls algorithm with , then sends to .
- (c)
- : given as input, challenger calls algorithm with , then sends to .
- : Adversary chooses two plaintext , and an identity t, there is a contraint that t can not be queried in extract queriy phase or Aut-1 authorization query phase. picks a bit randomly, then encrypts :challenger sends the obtained challenge ciphertext to the adversary .
- : issues the same type query as in Phase 1, and there are two following restrictions:
- 1.
- In the key retrieve query phase or Aut-1 authorizations query phase, i could not be allowed to query;
- 2.
- In the decryption query phase or the authorization query phase, could not be queried.
- : returns a bit . If holds, it means that wins the game, then outputs 1.
□
6. Efficiency Analysis
In Table 1, we describe the communication complexity of our scheme, and compare it with other schemes [4,5,23,24]. , , and are used to represent the size of elements in , G, and , the second column represents the size of the public key, the third column represents the size of a private key, the four columns represent the size of ciphertext. We can see that our scheme has a smaller size than [4,23,24] in public key and ciphertext, and has a smaller size than [5] in the ciphertext.
Table 1.
Communication complexity.
In Table 2, we show the comparison of encryption, decryption, authorization, and test in computation complexity. We use “I”, “E”, and “P” to represent the inversion operation, exponentiation operation and pairing operation, respectively, and represent the comparison of the encryption process, decryption process, authorization process, and test process in computation complexity from the second to fifth columns. In the sixth column, we represent whether the scheme is identity-based, and represents whether the scheme is pairing-based in the last column. Our scheme and [5] have four authorization algorithms. Since Aut-4 is a combination of Aut-1 and Aut-2, we omit Aut-4 for simplicity. In Table 2 and Figure 2, we list the three authorization algorithms of our scheme and [5] for comparison. In the encryption algorithm, Ref. [5] requires seven exponential operations, while our scheme only requires three exponential operations. In the Aut-2 authorization algorithm, Ref. [5] requires one pairing operation, and our scheme only requires two exponential operations. In Aut-3 authorization algorithm, Ref. [5] requires two pairing operations, and our scheme only requires four exponential operations. For the two authorization processes, our scheme reduces the computation costs by 60%, respectively. Reducing the use of pairings is key to reducing computational costs. Compared with [4,23,24], our scheme and [5] are based on identity encryption. The user’s public key can be a string related to the user’s identity information, which avoids complicated public key certificate management and public key storage. However, Refs. [4,23,24] use public key encryption, which requires a large amount of storage and complex management. Among all the schemes we list, our scheme is the only one that can achieve both ID-based and no pairing.
Table 2.
Computation complexity.
Figure 2.
Computational costs comparison of three authorizations with Li [5].
From the comparison results in Figure 2, it can be seen that the calculation costs of the authorization algorithms of the three authorization methods in our scheme are significantly lower than that of the corresponding three authorization algorithms in Li et al.’s scheme [5]. Compared with other schemes [4,5,23,24], our scheme is more flexible and efficient. In cloud computing, our scheme is applicable to more application scenarios and has high practical significance.
7. Conclusions
In this paper, we propose a new IBE scheme without pairing, which supports the ciphertext equality test. Our scheme introduces the authorization mechanism proposed in the scheme [4], four types of authorization policies providing better flexibility. Compared with works [4,23,24], our scheme is in IBE settings, which means do not need to suffer from complex key store and distribution problems. Compared with works [5], we replaced pairing with discrete logarithms, which helps reduce the computation cost. Specifically, compared to Li et al.’s work, about 57% = (100) time cost is saved for the encryption process, and about 60% = (100) time costs are saved for the type-2 authorization process and type-3 authorization process. Based on mathematical assumptions, we define the security models of our scheme and prove the security of the scheme.
Our proposed approach can be applied to equality tests over ciphertexts encrypted with different public keys, which increases the application range of cloud computing. Furthermore, our scheme is in IBE settings, avoiding complex key management issues. However, there are security channel key distribution and private key escrow issues in IBE. In the future, we will try to combine the advantages of IBE and PKE to propose more secure and efficient equality test schemes.
Funding
This work was supported by the National Natural Science Foundation of China (NSFC) (No. 61972050), the Beijing Natural Science Foundation (No. L191012) and the 111 Project (No. B08004).
Institutional Review Board Statement
Not applicable.
Data Availability Statement
Not applicable.
Conflicts of Interest
The author declares no conflict of interest.
References
- Boneh, D.; Crescenzo, G.D.; Ostrovsky, R.; Persian, G. Public key encryption with keyword search. In Proceedings of the Advances in Cryptology—EUROCRYPT 2004, Interlaken, Switzerland, 2–6 May 2004. [Google Scholar]
- Yang, G.; Tan, C.H.; Huang, Q.; Wong, D.S. Probabilistic public key encryption with equality test. In Proceedings of the Topics in Cryptology—CT-RSA 2010, San Francisco, CA, USA, 1–5 March 2010. [Google Scholar]
- Tang, Q. Towards public key encryption scheme supporting equality test with fine grained authorization. In Proceedings of the Australisian Conference on Information Security and Privacy (ACISP), Melbourne, Australia, 11–13 July 2011. [Google Scholar]
- Ma, S.; Huang, Q.; Zhang, M.W.; Yang, B. Efficient public key encryption with equality test supporting flexible authorization. IEEE Trans. Inf. Forensics Secur. 2015, 10, 458–470. [Google Scholar] [CrossRef]
- Li, H.B.; Huang, Q.; Ma, S.; Shen, J.; Susilo, W. Authorized equality test on identity-based ciphertexts for secret data sharing via cloud storage. IEEE Access 2019, 7, 25409–25421. [Google Scholar] [CrossRef]
- Shamir, A. Identity-based cryptosystems and signature schemes. In Proceedings of the Advances in Cryptology—CRYPTO 1984, Santa Barbara, CA, USA, 19–22 August 1984. [Google Scholar]
- Paterson, K.G.; Srinivasan, S. On the relations between non-interactive key distribution, identity-based encryption and trapdoor discrete log groups. Des. Codes Cryptogr. 2009, 52, 219–241. [Google Scholar] [CrossRef]
- Chuah, M.; Hu, W. Privacy-aware bedtree based solution for fuzzy multi-keyword search over encrypted data. In Proceedings of the 31st International Conference on Distributed Computing Systems Workshops, Minneapolis, MN, USA, 20–24 June 2011. [Google Scholar]
- Park, D.J.; Kim, K.; Lee, P.J. Public key encryption with conjunctive field keyword search. In Proceedings of the International Conference on Information Security Applications(WISA), Jeju Island, Republic of Korea, 23–25 August 2004. [Google Scholar]
- Byun, J.W.; Rhee, H.S.; Park, H.A.; Lee, D.H. Off-line keyword guessing attacks on recent keyword search schemes over encrypted data. In Proceedings of the Secure Data Management(SDM), Seoul, Republic of Korea, 10–11 September 2006. [Google Scholar]
- Bellare, M.; Boldyreva, A.; O’Neill, A. Deterministic and efficiently searchable encryption. In Proceedings of the Advances in Cryptology—CRYPTO 2007, Santa Barbara, CA, USA, 19–23 August 2007. [Google Scholar]
- Tang, Q. Public key encryption schemes supporting equality test with authorisation of different granularity. IJACT 2012, 2, 304–321. [Google Scholar] [CrossRef]
- Tang, Q. Public key encryption supporting plaintext equality test and user-specified authorization. Secur. Commun. Netw. 2012, 5, 1351–1362. [Google Scholar] [CrossRef]
- Ma, S.; Zhang, M.W.; Huang, Q.; Yang, B. Public Key Encryption with Delegated Equality Test in a Multi-User Setting. Comput. J. 2015, 58, 986–1002. [Google Scholar] [CrossRef]
- Wu, T.; Ma, S.; Mu, Y.; Zeng, S.K. ID-Based Encryption with Equality Test Against Insider Attack. In Proceedings of the Australasian Conference on Information Security and Privacy (ACISP), Auckland, New Zealand, 3–5 July 2017. [Google Scholar]
- Ma, S. Authorized Equality Test of Encrypted Data for Secure Cloud Databases. In Proceedings of the 2018 17th IEEE International Conference On Trust, Security Furthermore, Privacy in Computing Furthermore, Communications/12th IEEE International Conference On Big Data Science Furthermore, Engineering (TrustCom/BigDataSE), New York, NY, USA, 1–3 August 2018. [Google Scholar]
- Huang, K.B.; Raylin, T.; Yu-Chi, C. PKE-AET:Public Key Encryption with Authorized Equality Test. Comput. J. 2015, 58, 2686–2697. [Google Scholar] [CrossRef]
- Huang, K.B.; Raylin, T.; Yu-Chi, C. A New Public Key Encryption with Equality Test. In Proceedings of the Network and System Security (NSS), Xi’an, China, 15–17 October 2014. [Google Scholar]
- Huang, K.B.; Yu-Chi, C.; Raylin, T. Semantic Secure Public Key Encryption with Filtered Equality Test-PKE-FET. In Proceedings of the 12th International Joint Conference on e-Business and Telecommunications (ICETE), Colmar, France, 20–22 July 2015. [Google Scholar]
- Huang, K.B.; Raylin, T.; Yu-Chi, C. Somewhat semantic secure public key encryption with filtered-equality-test in the standard model and its extension to searchable encryption. J. Comput. Syst. Sci. 2017, 89, 400–409. [Google Scholar] [CrossRef]
- Zhu, H.J.; Wang, L.C.; Ahmad, H.; Niu, X.X. Key-policy attribute-based encryption with equality test in cloud computing. IEEE Access 2017, 5, 20428–20439. [Google Scholar] [CrossRef]
- Wang, Q.; Peng, L.; Xiong, H.; Sun, J.F.; Qin, Z.G. Ciphertext-policy attribute-based encryption with delegated equality test in cloud computing. IEEE Access 2018, 6, 760–771. [Google Scholar] [CrossRef]
- Lin, X.J.; Sun, L.; Qu, H.p.; Zhang, X.S. Public key encryption supporting equality test and flexible authorization without bilinear pairings. Comput. Commun. 2021, 170, 190–199. [Google Scholar] [CrossRef]
- Zhu, H.J.; Wang, L.C.; Ahmad, H.; Niu, X.X. Pairing-free equality test over short ciphertexts. Int. J. Distrib. Sens. Netw. 2017, 13. [Google Scholar] [CrossRef]
- Ma, S. Identity-based encryption with outsourced equality test in cloud computing. Inf. Sci. 2016, 328, 389–402. [Google Scholar] [CrossRef]
- Duong, D.H.; Roy, P.S.; Susilo, W.; Fukushima, K.; Kiyomoto, S.; Sipasseuth, A. Chosen-ciphertext lattice-based public key encryption with equality test in standard model. Theor. Comput. Sci. 2022, 905, 31–53. [Google Scholar] [CrossRef]
- Amerini, I.; Anagnostopoulos, A.; Maiano, L.; Celsi, L.R. Deep Learning for Multimedia Forensics. Found. Trends Comput. Graph. Vis. 2021, 12, 309–457. [Google Scholar] [CrossRef]
- Susilo, W.; Guo, F.C.; Zhao, Z.; Wu, G. PKE-MET: Public-key encryption With multi-ciphertext equality test in cloud computing. IEEE Trans. Cloud Comput. 2022, 10, 1476–1488. [Google Scholar] [CrossRef]
- Lin, X.J.; Wang, Q.; Sun, L.; Qu, H. Identity-based encryption with equality test and datestamp-based authorization mechanism. Theor. Comput. Sci. 2021, 861, 117–132. [Google Scholar] [CrossRef]
- Deverajan, G.G.; Muthukumaran, V.; Hsu, C.; Karuppiah, M.; Chung, Y.; Chen, Y. Public key encryption with equality test for Industrial Internet of Things system in cloud computing. Trans. Emerg. Telecommun. Technol. 2021, 33, e4202. [Google Scholar] [CrossRef]
- Vaanchig, N.; Qin, Z.; Ragchaasuren, B. Constructing secure-channel free identity-based encryption with equality test for vehicle-data sharing in cloud computing. Trans. Emerg. Telecommun. Technol. 2020, 33, e3896. [Google Scholar] [CrossRef]
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2023 by the author. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).