Abstract
The identity-based encryption with equality test (IBEET) has become a hot research topic in cloud computing as it provides an equality test for ciphertexts generated under different identities while preserving the confidentiality. Subsequently, for the sake of the confidentiality and authenticity of the data, the identity-based signcryption with equality test (IBSC-ET) has been put forward. Nevertheless, the existing schemes do not consider the anonymity of the sender and the receiver, which leads to the potential leakage of sensitive personal information. How to ensure confidentiality, authenticity, and anonymity in the IBEET setting remains a significant challenge. In this paper, we put forward the concept of the identity-based matchmaking encryption with equality test (IBME-ET) to address this issue. We formalized the system model, the definition, and the security models of the IBME-ET and, then, put forward a concrete scheme. Furthermore, our scheme was confirmed to be secure and practical by proving its security and evaluating its performance.
1. Introduction
The swift progress in cloud computing featured by the outsourcing of data to the cloud has given rise to a growing trend among organizations and individuals, enabling entities to benefit from the ultra-large capacity and calculating services provided by cloud providers. The maintenance of data confidentiality is a fundamental security requirement of cloud storage, which is generally achieved by employing existing cryptographic mechanisms. Nonetheless, how to perform efficient searches on ciphertexts is a practical problem. In order to protect data confidentiality and, meanwhile, support privacy-preserving keyword searching on ciphertexts, public key encryption with keyword search (PEKS) has been presented []. Nevertheless, PEKS is limited to searching on ciphertexts generated under a single public key, rendering it unsuitable for cloud storage scenarios involving multiple users.
To provide privacy-preserving equality searching on ciphertexts encrypted under distinct public keys without losing the data confidentiality, Yang et al. [] put forward an extension of PEKS known as the public key encryption with equality test (PKEET). However, in Yang et al.’s construction, anyone can conduct the equality test without authorization, which infringes on the data owner’s privacy. Hence, the authorization mechanism was introduced into the PKEET to guarantee that no one except the data owner can enable the cloud server to test its ciphertexts with the others’.
Subsequently, Ma [] proposed the identity-based encryption with equality test (IBEET) to eliminate the certificate management problem of the PKEET. In this primitive, the identities of the sender and receiver were exploited to denote the public keys, eliminating the need for certificate management. Owing to the equality test function, the IBEET has been applied in various practical applications, such as personal health record (PHR) systems [,] and Internet of Vehicles (IoV) road monitoring [].
Ensuring the authenticity of data is another fundamental security requirement of cloud storage. For the sake of the confidentiality and authenticity of data while supporting the privacy-preserving equality test for ciphertexts generated from different identities, Xiong et al. [] presented the identity-based signcryption with equality test (IBSC-ET). Afterwards, several related signcryption schemes supporting the equality test have been conceived of. Nevertheless, the existing studies have not considered the anonymity of the sender and the receiver, which leads to the potential leakage of sensitive personal information.
1.1. Motivation
As depicted in Figure 1, in a PHR system, the patients’ PHRs contain as much relevant health data as possible from various healthcare providers over their lifetime. To ensure patients’ privacy, it is essential to store the health data in the cloud in ciphertext form. To find patients having similar illnesses, a patient (e.g., Alice or Bob) can authorize the cloud server to compare his/her ciphertexts sent by a specified healthcare provider with the others’ ciphertexts, so that the patients can help each other by sharing their experiences or mental processes.
Figure 1.
PHR system model.
However, by employing the existing signcryption schemes with equality test (to guarantee the confidentiality and authenticity of health data while supporting the privacy-preserving equality test on ciphertexts), the patients are unable to prevent sensitive personal information from being leaked to the cloud server. That is because the existing schemes do not consider the anonymity of the sender and receiver of the ciphertext. Consequently, the cloud server can know the healthcare provider of the ciphertext, e.g., MD Anderson Cancer Center. Likewise, from the ciphertext and the authorization trapdoor, the cloud server can learn whose identity the ciphertext is encrypted under, namely who is the receiver of the ciphertext, in this way to identify the patient associated with the ciphertext. Obviously, this seriously infringes upon the patient’s privacy.
Hence, during the equality testing procedure, there are three security aspects that should be guaranteed against the cloud server:
- Confidentiality: The cloud server has no knowledge about the health data concealed in the ciphertext.
- Authenticity: The cloud server is unable to fake any legitimate ciphertext pertaining to the sender and the receiver.
- Anonymity: The cloud server has no knowledge about the identities of the sender and the receiver concealed in the ciphertext.
Therefore, we propose a new primitive, which not only offers the confidentiality, authenticity, and anonymity of data stored in the cloud, but also provides equality test functionality for ciphertexts generated under different identities without losing the confidentiality, authenticity, and anonymity of the data.
1.2. Related Works
Search on ciphertexts: Searchable encryption (SE) [] was put forward to offer secure search functionality over ciphertexts encrypted under single public key. There are two categories of SE: public key encryption with keyword search (PEKS) [,,] and symmetric searchable encryption (SSE) [,]. PEKS was conceived of by Boneh et al. [] to support keyword searching over ciphertexts in public key settings by using the corresponding trapdoors without retrieving messages. After that, a variety of PEKS schemes have been presented for enhanced functionalities and different application requirements [,]. However, SE cannot offer equality test functionality for ciphertexts generated under different identities, which differs from our proposal.
Equality test on ciphertexts: The primitive of the PKEET was put forward to verify whether the identical message is concealed in two ciphertexts, where the ciphertexts may be encrypted under distinct public keys []. Then, the authorization mechanisms were introduced into the PKEET, and a series of PKEET schemes supporting various authorizations were proposed [,]. Ma [] first introduced the primitive of the IBEET, to eliminate the certificate management problem of the traditional PKEET. A semi-generic IBEET scheme was conceived of by Lee et al. [] to achieve CCA security. Then, several IBEET schemes supporting various authorizations were introduced [,]. Although the above schemes offer equality test functionality while preserving the confidentiality, the data authenticity is not guaranteed. To address this challenge, Xiong et al. [] established the notion of the IBSC-ET by combining identity-based signcryption (IBSC) [] and the IBEET. Afterwards, several signcryption schemes with equality test functionality for heterogeneous systems were proposed [,,]. However, the existing studies have not considered the anonymity of the sender and the receiver, which leads to the potential leakage of sensitive personal information, which differs from our proposal.
Identity-based matchmaking encryption: In CRYPTO 2019, Ateniese et al. [] put forward the primitive of identity-based matching encryption (IB-ME) to logically ensure the confidentiality, authenticity, and anonymity of data in one step. The guarantee of IB-ME is as follows: the recipient obtains the message when the match happens (both parties’ identities match the identity specified by the other party); in case the match does not happen, no information is disclosed other than the fact of the mismatch. Then, by extending IB-ME, a secure access control scheme was conceived of by Xu et al. [] for cloud–fog computing, and a secure access control scheme was suggested by Sun et al. [] for cloud-enabled industrial IoT healthcare systems. Chen et al. [] suggested an IB-ME scheme on the basis of standard assumptions. Wu et al. [] conceived of a Fuzzy IB-ME scheme. Yan et al. [] conceived of an IB-ME scheme supporting proxy decryption. Sun et al. [] suggested an IB-ME scheme supporting a broadcast mechanism. However, although IB-ME can ensure the confidentiality, authenticity, and anonymity of data, all of these related schemes cannot offer equality test functionality for ciphertexts without losing the confidentiality, authenticity, and anonymity of the data, which differs from our proposal.
1.3. Contributions
We emphasize here again that the existing cryptographic schemes with the equality test do not consider the anonymity of the sender and the receiver, which leads to the potential leakage problem of sensitive personal information. Hence, we put forward a novel primitive, called the identity-based matchmaking encryption with equality test (IBME-ET), by combining IB-ME and the IBEET. This primitive not only offers the confidentiality, authenticity, and anonymity of data stored in the cloud, but also provides equality test functionality for ciphertexts generated under different identities without losing the confidentiality, authenticity, and anonymity of the data.
Our proposed IBME-ET can advance the anonymity of existing applications. For example, in a PHR system [,], the patient can permit the cloud server to compare his/her encrypted health data sent by a specified healthcare provider with the others’, in this way to make friends with the patients having a similar illness. Our proposal can simplify the leakage problem of the real identities of the healthcare provider and the patient, which exists in current cryptographic schemes with the equality test, thereby guaranteeing the confidentiality, authenticity, and anonymity of the patients’ health data.
The equality testing process in the IBME-ET can be succinctly outlined as follows: Let denote a ciphertext generated on and denote a ciphertext generated on , where and are the encryption keys of the senders with identities and and and are the identities of the specified receivers, respectively. Furthermore, let be a trapdoor generated on and be a trapdoor generated on , where and are the identities of the specified senders and and are the decryption keys of the receivers with identities and , respectively. Given and , two conditions are involved:
- Match (i.e., ): the cloud server returns 1, and no further information is revealed other than the fact that the match happened, that is the cloud server learns neither the messages nor the identities , , , .
- Mismatch (i.e., ): the cloud server returns 0, and no further information is revealed other than the fact of the mismatch, that is the cloud server learns neither the messages , nor the identities , , , , , , , .
The principal contributions can be succinctly outlined as follows:
- We present the notion of the IBME-ET, which not only offers the confidentiality, authenticity, and anonymity of data stored in the cloud, but also provides equality test functionality for ciphertexts generated under different identities without losing the confidentiality, authenticity, and anonymity of the data.
- We put forward the system model and definition of the IBME-ET. With respect to the confidentiality, authenticity, and anonymity, we formulated four security models for the IBME-ET by taking four types of adversaries into account.
- We constructed a concrete IBME-ET scheme on the basis of the BDH assumption and the Gap-BDH assumption. Our scheme was confirmed to be secure and practical by proving its security and evaluating its performance.
1.4. Organization
In general: Section 2 introduces the preliminaries while Section 3 presents IBME-ET by displaying its system, definition and four security models. Section 4 and Section 5, respectively, focus on the detailed scheme and analysis of security. Then, Section 6 focuses on performance evaluation, Section 7 arrives at a conclusion.
2. Preliminaries
2.1. Asymmetric Bilinear Groups
, and indicate three multiplicative cyclic groups with prime order q. g and are the generators of and , respectively. An asymmetric bilinear map includes the following characteristics:
- Bilinearity:, and , .
- Non-degeneracy:, , .
Note that the group operations and asymmetric bilinear map e can be computed efficiently. However, if no efficiently computable isomorphisms are found between and , then and do not possess efficiently computable isomorphisms.
2.2. Assumptions
- Bilinear Diffie–Hellman (BDH) assumption: When a tuple is given, no PPT algorithm calculates with non-negligible advantage. Define ’s advantage as
- Gap-bilinear Diffie–Hellman (Gap-BDH) assumption: When a tuple is given, even with the decision BDH oracle , no PPT algorithm calculates with non-negligible advantage []. Tuples of the form are known as “BDH tuples”. With , is able to check or not. outputs 1 when ; otherwise, outputs 0. Define ’s advantage as
3. Definitions of IBME-ET
3.1. System Model
In Figure 2, our proposed IBME-ET comprises four distinct entities.
Figure 2.
IBME-ET system model.
- KGC: This entity’s responsibility is to securely generate and distribute encryption keys and decryption keys.
- Sender: This entity’s responsibility is to generate ciphertexts, ensuring the confidentiality, authenticity, and anonymity of the data.
- Receiver: This entity is responsible for collecting and outsourcing ciphertexts from potential senders secretly. It permits the cloud server to test ciphertexts sent by a specific sender without compromising the confidentiality, authenticity, and anonymity of the data.
- Cloud server: This entity’s responsibility is to store the ciphertexts and perform equality tests based on the receivers’ authorizations.
Our workflow is succinctly outlined as follows:
- The KGC utilizes the algorithm SKGen to calculate the encryption key in accordance with the identity of the sender and securely delivers this to the sender. Similarly, the KGC utilizes the algorithm RKGen to calculate the decryption key in accordance with the identity of the receiver and securely delivers this to the receiver.
- A sender identified as executes the algorithm Enc to conceal the message m using encryption key along with a target receiver’s identity , delivering it to the receiver with the ciphertext .
- A receiver identified as executes the algorithm Decc to decrypt the ciphertexts by employing the receiver’s decryption key and the identity of the target sender , delivering the desirable ciphertexts to the cloud server. Specifically, given , , and , the guarantee in the decryption procedure is as follows:
- Match (i.e., ): the message m is obtained by the receiver.
- Mismatch (i.e., ): the receiver obtains neither the message m nor the identities , .
- To test the ciphertexts offered by a target sender, the receiver identified as executes the algorithm Auth to calculate a trapdoor with the identity of the target sender and its decryption key and delivers the trapdoor to the cloud server.
- Utilizing the receivers’ trapdoors, the cloud server executes the algorithm Test to test the ciphertexts sent by the specified senders without learning the messages and identities. Specifically, given and , the guarantee in equality testing procedure is as follows:
- Match (i.e., ): the cloud server returns 1, and the cloud server learns neither the messages nor the identities , , , .
- Mismatch (i.e., ): the cloud server returns 0, and the cloud server learns neither the messages , nor the identities , , , , , , , .
3.2. IBME-ET Definition
An IBME-ET scheme comprises the subsequent algorithms:
- : The system parameters along with the master key are answered.
- : The encryption key for the sender identified as is answered.
- : The decryption key for the receiver identified as is answered.
- : Given the system parameters , an encryption key of the sender , and an identity of the target receiver along with the message m, the corresponding ciphertext C is answered.
- : Given the system parameters , a decryption key of the receiver , and an identity of the target sender along with the ciphertext C, the corresponding message m is answered or the symbol ⊥ to signal the failure of the decryption is answered.
- : Given the system parameters and an identity of the target sender along with a decryption key of the receiver , the corresponding trapdoor is answered.
- : Given the system parameters , two pairs of ciphertext/trapdoors and , if and are generated using the identical message, it answers 1. Otherwise, it answers 0.
Correctness: An IBME-ET scheme is correct when the subsequent conditions are met:
- When , always holds.
- Let , , , and . If , , otherwise, , is negligible.
3.3. Security Definitions
With respect to the confidentiality, authenticity, and anonymity of the IBME-ET, it is crucial to consider four distinct types of adversaries:
- Type-I adversary : Without the trapdoor and decryption key of the receiver, is unable to determine which message the challenge ciphertext is computed from. For , define the security model IND-ID-CCA.
- Type-II adversary : Without the decryption key of the receiver, is unable to obtain the message concealed in the challenge ciphertext. For , define the security model OW-ID-CCA.
- Type-III adversary : Without the decryption key of the receiver and the encryption key of the sender, is unable to determine the corresponding sender and receiver, even if has the trapdoor. For , define the security model ANON-ID-CCA.
- Type-IV adversary : Without the decryption key of the receiver and the encryption key of the sender, is unable to fake any legitimate ciphertext delivered by the sender to the receiver, even if has the trapdoor. For , define the security model sUF-ID-CMA.
Let be the challenger. We have the following oracles:
- : Once the identity of the sender is received, answers the encryption key .
- : Once the identity of the receiver is received, answers the decryption key .
- : Once the identity of the sender , the identity of the target receiver , and a message m are received, answers the result of .
- : Once the identity of the receiver , the identity of the target sender , and a ciphertext C are received, answers the result of .
- : Once the identity of the target sender and the identity of the receiver are received, answers the corresponding trapdoor .
Definition 1
(IND-ID-CCA). Regarding , the IBME-ET scheme meets IND-ID-CCA security when no PPT is winning the game below with a non-negligible advantage:
- 1.
- Setup: utilizes the algorithm to calculate the master key and the system parameters and delivers to .
- 2.
- Phase 1: can issue queries to the oracles: , , , .
- 3.
- Challenge: sends identities and equal-length messages to . Subsequently, randomly selects and answers with the challenge ciphertext .
- 4.
- Phase 2: makes queries like in 1.
- 5.
- Guess: answers a guess and is winning when . ’s advantage is defined as Pr
In the above game, the constraint is that cannot ask the following queries: , , .
Definition 2
(OW-ID-CCA). Regarding , the IBME-ET scheme meets OW-ID-CCA security when no PPT is winning the game below with a non-negligible advantage:
- 1.
- Setup: Same as Definition 1.
- 2.
- Phase 1: can issue queries to the oracles: , , , .
- 3.
- Challenge: sends identities to . Subsequently, randomly chooses a message and answers to with the challenge ciphertext .
- 4.
- Phase 2: makes queries like in 1.
- 5.
- Guess: answers a guess and is winning when . ’s advantage is defined as Pr
In the above game, the constraints is that cannot ask the following queries: , .
Definition 3
(ANON-ID-CCA). Regarding , the IBME-ET scheme meets ANON-ID-CCA security when no PPT is winning the game below with a non-negligible advantage:
- 1.
- Setup: Same as Definition 1.
- 2.
- Phase 1: can issue queries to the oracles: , , , , .
- 3.
- Challenge: sends identities , and a message to . Subsequently, randomly chooses and answers to with the challenge ciphertext and the challenge trapdoor .
- 4.
- Phase 2: makes queries like in 1.
- 5.
- Guess: answers a guess and is winning when . ’s advantage is defined as Pr
In the above game, the constraint is that cannot ask the following queries:
- , , and .
- , , and .
- , .
Definition 4
(sUF-ID-CMA). Regarding , the IBME-ET scheme meets sUF-ID-CMA security when no PPT is winning the game below with a non-negligible advantage:
- 1.
- Setup: Same as Definition 1.
- 2.
- Queries: can issue queries to the oracles: , , , , .
- 3.
- Forgery: answers a triple . is winning when , . ’s advantage is defined as Pr wins].
In the above game, the constraint is that cannot make the following queries: and . Furthermore, cannot be an output of .
4. Our Construction
The IBME-ET scheme is concretely constructed as below:
- Setup(): The following steps are taken:
- Randomly select the generators along with .
- Randomly select numbers , and set , , , , .
- Secure hash functions are defined: , , , , , , , , and .
- Return the master key along with the system parameters , where
- SKGen(): Let . This algorithm produces the encryption key
- RKGen(): Let . This algorithm produces the decryption key .
- Enc(): Let and . The ciphertext is calculated as below:
- Randomly select and , and calculate .
- Calculate , and .
- Calculate the following numbers:
- (): Let , . The following steps are taken:
- Calculate and .
- Obtain by computing .
- Calculate .
- If and hold, answer ; otherwise, answer ⊥.
- Auth(): Let and . The following steps are taken:
- Randomly select , and calculate .
- Return the trapdoor .
- Test(): Let , , , , and . The following steps are taken:
- Calculate
- Calculate
- Check whether holds. When it holds, answer 1 or 0 otherwise.
Correctness: The proposed scheme is correct in accordance with the correctness definition:
- Regarding Condition 1, when and , we haveThus, when and , always holds.
- Regarding Condition 2, if , we haveIf , then , so otherwise, is negligible due to the hash functions and being collision-resistant.
5. Security Analysis
In the random oracle model, we used the method of proof by contradiction to show that if the BDH assumption and Gap-BDH assumption introduced in the preliminaries (see Section 2) hold, and our proposed IBME-ET scheme can meet confidentiality, authenticity, and anonymity in cryptography [,,].
According to our IBME-ET scheme, given the ciphertext C, we have the following observations:
- To reveal the message m, it is necessary to calculate .
- To obtain , which is used for the equality test, it is necessary to calculate .
- To distinguish the identities of the sender and the receiver concealed in the ciphertext, it is necessary to calculate .
- To fake any legitimate ciphertext pertaining to the sender and the receiver , it is necessary to calculate .
Note that, regarding to the confidentiality, anonymity, and authenticity of the IBME-ET, four security models are defined by considering four distinct types of adversaries (see Section 3.3). The security proof of our scheme can be outlined as follows:
As for the confidentiality, we first used the BDH assumption to prove that our proposal meets IND-ID-CCA security regarding the Type-I adversary . Given a BDH assumption instance , we generated a simulated scheme and interacted with by following the IND-ID-CCA security model defined in Section 3.3. simulates the oracles , , , and to answer ’s queries and preserves the and lists to simulate the random oracles and . In the challenge phase, sends identities and equal-length messages to . Let . randomly selects and answers the challenge ciphertext to . In the simulation, the challenge ciphertext implicitly sets , , , , where , , , , , , , , and . Finally, in the guess phase, outputs a guess . The advantage of for breaking our proposal is defined as Pr If is non-negligible, then the tuple is documented in with non-negligible probability. If selects the right tuple from , can return the BDH instance solution . As a result, the BDH assumption can be addressed by with non-negligible advantage if is able to break our proposal with non-negligible advantage.
Subsequently, as for the confidentiality, we used the BDH assumption to prove that our proposal meets OW-ID-CCA security regarding the Type-II adversary . Given a BDH assumption instance , we generated a simulated scheme and interacted with by following the OW-ID-CCA security model defined in Section 3.3. simulates the oracles , , , and to answer ’s queries and preserves the and lists to simulate the random oracles and . In the challenge phase, sends identities to . Let . randomly chooses a message and answers the challenge ciphertext to . In the simulation, the challenge ciphertext implicitly sets , , where , , , , , , , , , and . Finally, in the guess phase, outputs a guess . The advantage of for breaking our proposal is defined as Pr. If is non-negligible, then the tuple is documented in with non-negligible probability. If selects the right tuple from , can return the BDH instance solution . As a result, the BDH assumption can be addressed by with non-negligible advantage if is able to break our proposal with non-negligible advantage.
As for the anonymity, we used the Gap-BDH assumption to prove that our proposal meets ANON-ID-CCA security regarding the Type-III adversary . Given a Gap-BDH assumption instance , we generated a simulated scheme and interacted with by following the ANON-ID-CCA security model defined in Section 3.3. simulates the oracles , , , , , , and to answer ’s queries. In the challenge phase, sends identities , and a message to . Let , . randomly chooses and answers the challenge ciphertext and the challenge trapdoor to . In the simulation, the challenge ciphertext implicitly sets , , , where , , , , , , , , , , and Furthermore, the challenge trapdoor implicitly sets , where , , . Finally, in the guess phase, outputs a guess . The advantage of for breaking our proposal is defined as Pr If is non-negligible, has been queried to with non-negligible probability. With , can return the Gap-BDH instance solution . As a result, the Gap-BDH assumption can be addressed by with non-negligible advantage if is able to break our proposal with non-negligible advantage.
As for the authenticity, we used the Gap-BDH assumption to prove that our proposal meets sUF-ID-CMA security regarding the Type-IV adversary . Given a Gap-BDH assumption instance , we generated a simulated scheme and interacted with by following the sUF-ID-CMA security model defined in Section 3.3. simulates the oracles , , , , , , and to answer ’s queries. In the simulation, the following numbers are implicitly set , where , , , . In the forgery phase, outputs a triple , where and . If , wins. The advantage of for breaking our proposal is defined as Pr. With and the lemma on the relationship between the chosen-identity attack and given identity attack [], if is non-negligible, has been queried to with non-negligible probability. Then, , can return the Gap-BDH instance solution . As a result, the Gap-BDH assumption can be addressed by with non-negligible advantage if is able to break our proposal with non-negligible advantage.
Theorem 1.
For any , our IBME-ET scheme meets IND-ID-CCA security on the basis of the BDH assumption.
More precisely, if is able to break our proposal with the advantage ϵ, we can conceive of a PPT algorithm to address the BDH assumption with the advantage where and denote the numbers of different queries to and , respectively.
Proof.
Given a BDH assumption instance , the task of is to calculate by interacting with as below:
- (1)
- Setup: randomly selects , . randomly chooses , calculates , , , , and , sets , and delivers this to with . implicitly sets , because has no knowledge about a. preserves the and lists to simulate and . Afterwards, randomly selects .
- (2)
- Phase1: answers ’s queries.
- : When , randomly selects , inserts a tuple into , and answers I. Otherwise, answers .
- : Suppose as the i-th different query. When , randomly selects , inserts a tuple into , and returns . Otherwise, has , inserts a tuple into , and returns .
- : Suppose as the j-th different query. When , randomly selects , inserts a tuple into , and returns . Otherwise, has , inserts a tuple into , and returns .
- : performs a simulation algorithm to query . Subsequently, searches the tuple in . When , selects randomly, inserts a tuple into , and returns . Otherwise, has , inserts a tuple into , and returns .
- : randomly chooses , inserts a tuple into , and answers R.
- : randomly chooses , inserts a tuple into , and answers .
- : randomly selects , inserts a tuple into , and returns .
- : randomly selects , inserts a tuple into , and returns .
- : performs a simulation algorithm to query . There is a tuple in . Next, returns .
- : performs a simulation algorithm to query . There are a tuple in and a tuple in . When , returns . Otherwise, is aborted by failure.
- : Let . performs a simulation algorithm to query and .
- -
- When , can query to obtain and returns the outcome of the algorithm .
- -
- Otherwise, can query to obtain and calculates . For each tuple in , calculates and calculates . If and there exists a tuple in such that holds, it outputs . Once has no such tuple, outputs ⊥.
- : Let . performs a simulation algorithm to query and . When , can query to obtain , returns . Otherwise, executes the following operations:
- -
- When , is aborted by failure.
- -
- Otherwise, has a tuple and has a tuple , and can query to obtain , calculates , and , randomly selects , calculates , implicitly sets , and returns . is a valid random trapdoor according to and , where
- (3)
- Challenge: offers equal-length messages along with the pair of sender/receiver identities () to . Let . Afterwards, utilizes a simulation algorithm to query and .
- -
- When the -th tuple in is and the -th tuple in is , randomly selects , , and , calculates , , , , , and , and then, sends the challenge ciphertext to .The above construction implicitly sets , , , , where , , .
- -
- Otherwise, is aborted by failure.
- (4)
- Phase2: makes queries like in 1.
- (5)
- Guess: answers a guess . randomly selects a tuple from and returns the BDH instance solution .
□
Analysis: It is obvious that the simulations of , , , , , and are perfect. Denote the query as the event . Denote the query as the event . Denote the failure of to decrypt the legitimate ciphertext in as the event . Thus, . Let . Suppose as the event in which terminates upon the query being issued, as the event in which terminates upon the query being issued, and as the event in which terminates in the challenge phase. Clearly, implies and , because the queries and cannot be issued. We obtain .
Define . There is no greater over advantage that will gain in guessing x when E does not happen because and are random oracles. . Hence,
With , we obtain
Subsequently, we obtain
When happens, can distinguish the simulation of the challenge ciphertext . Because has been documented in with non-negligible probability, is winning when the right element is selected from . Thus, the BDH assumption can be addressed by with advantage
Theorem 2.
For any , our IBME-ET scheme meets OW-ID-CCA security on the basis of the BDH assumption.
More precisely, if is able to break our proposal with the advantage ϵ, we are able to conceive of a PPT algorithm to address the BDH assumption with the advantage where and denote the numbers of different queries to and , respectively.
Proof.
Given a BDH assumption instance , the task of is to calculate by interacting with as below:
- (1)
- Setup: executes like in the proof of Theorem 1.
- (2)
- Phase1: answers ’s queries.
- For , , , , , , and , executes like in the proof of Theorem 1.
- : performs a simulation algorithm to query . Subsequently, searches the tuple in . When , randomly selects , inserts a tuple into , and returns . Otherwise, sets , inserts a tuple into , and returns .
- : performs a simulation algorithm to query . There is a tuple in . Next, returns .
- : performs a simulation algorithm to query . There are a tuple in and a tuple in . When , returns . Otherwise, is aborted by failure.
- : Let . performs a simulation algorithm to query and .
- -
- When , can query to obtain and returns the outcome of the algorithm .
- -
- Otherwise, can query to obtain and calculates . For each tuple in , calculates and calculates . If and there exists a tuple in such that holds, it outputs . When has no such tuple, outputs ⊥.
- : Let . performs a simulation algorithm to query and .
- -
- When , can query to obtain and returns .
- -
- Otherwise, there are a tuple in and a tuple in , and can query to obtain , calculates , , , and , randomly selects , and returns .
- (3)
- Challenge: submits a pair of sender/receiver identities () to . Let . Afterwards, chooses a message randomly and executes a simulation algorithm to query and .
- -
- When the -th tuple in is and the -th tuple in is , randomly selects , , calculates , , , , , , and , and delivers this to with the challenge ciphertext .The above construction implicitly sets , , where , , .
- -
- Otherwise, is aborted by failure.
- (4)
- Phase2: makes issues like in Phase1.
- (5)
- Guess: answers a guess . randomly chooses a tuple from and answers the BDH instance solution .
□
Analysis: It is obvious that the simulations of , , , , , , and are perfect. Denote the query as the event . Denote the failure of to decrypt the legitimate ciphertext in as the event . Hence, we have, . Let . Suppose as the event in which terminates upon the query being issued and the event in which terminates in the challenge phase. Clearly, implies , because the query cannot be issued. We obtain .
Define . There is no greater over advantage that will gain in guessing m when E does not happen, because is a random oracle. . Hence,
With , we obtain
Subsequently, we obtain
When happens, can distinguish the simulation of the challenge ciphertext . Because has been documented in with non-negligible probability, is winning when the right element is selected from . Thus, the BDH assumption can be addressed by with advantage
Theorem 3.
For any , our IBME-ET scheme meets ANON-ID-CCA security on the basis of the Gap-BDH assumption.
More precisely, if is able to break our proposal with the advantage ϵ, we are able to conceive of a PPT algorithm to address the Gap-BDH assumption with the advantage where and denote the numbers of different queries to and , respectively.
Proof.
Given a Gap-BDH assumption instance , the task of is to calculate by interacting with as below:
- (1)
- Setup: randomly selects and . randomly selects , calculates , , , and , sets , and delivers this to with . implicitly sets , because has no knowledge about a. preserves the , , and lists to simulate , , and . Afterwards, randomly selects and randomly chooses .
- (2)
- Phase1: answers ’s queries.
- : executes the following operations.
- -
- When , returns the Gap-BDH instance solution and defines and .
- -
- When , returns the Gap-BDH instance solution and defines and .
- -
- When , returns the Gap-BDH instance solution and defines and .
- -
- When , returns the Gap-BDH instance solution and defines and .
- -
- Otherwise, randomly selects .
Subsequently, inserts into and into and answers I. - : Suppose as the i-th different query. When , inserts a tuple into and returns . When , inserts a tuple into and returns . Otherwise, randomly selects , inserts a tuple into , and returns .
- : Suppose as the j-th different query. When , inserts a tuple into and returns . When , inserts a tuple into and returns . Otherwise, randomly selects , inserts a tuple into , and returns .
- : performs a simulation algorithm to query . Subsequently, searches the tuple in . When , inserts a tuple into and returns . When , inserts a tuple into and returns . Otherwise, randomly selects , inserts a tuple into , and returns .
- : performs a simulation algorithm to query . Subsequently, searches for the tuple in and returns .
- : randomly chooses , inserts a tuple into , and answers R.
- : performs a simulation algorithm to query . Subsequently, randomly selects , inserts a tuple into , and returns .
- : randomly selects , inserts a tuple into , and returns .
- : randomly selects , inserts a tuple into , and returns .
- : performs a simulation algorithm to query . There is a tuple in . When and , answers . Otherwise, is aborted by failure.
- : performs a simulation algorithm to query . There are a tuple in and a tuple in . When and , answers . Otherwise, is aborted by failure.
- : Let . performs a simulation algorithm to query and . When and , can query to obtain and returns . Otherwise, executes as below:
- -
- When or , is aborted by failure.
- -
- When or , executes a simulation algorithm to query . There is a tuple in . Afterwards, randomly selects , , , calculates , and , inserts a tuple into , and returns , where , , , , .
- -
- Otherwise, can query to get , selects , randomly, calculates , , and , and returns , where , , , , .
- : Let . performs a simulation algorithm to query and . When and , can query to obtain and returns the outcome of . Otherwise, executes the following operations:
- -
- When , or m or , or , searches for the tuple in . When has no such tuple, executes as below.When , , . When , , . When , , . When , , . Afterwards, randomly selects , calculates , implicitly sets , sets , and stores in . is a valid random trapdoor according to and , whereNext, calculates . For each tuple in , calculates and . If both and hold, returns m; otherwise, returns ⊥.
- -
- Otherwise, can query to obtain and calculates . For each tuple in , calculates and . If both and hold, returns m; otherwise, returns ⊥.
- : Let . performs a simulation algorithm to query and . There is a tuple in . When and , can query to obtain , calculates , , , returns , and stores into . Otherwise, executes as below:
- -
- When or , is aborted by failure.
- -
- When , , .
- -
- When , , .
- -
- Otherwise, can query to obtain and calculates , .
Subsequently, randomly selects , calculates , implicitly sets , returns , and then, stores in . is a valid random trapdoor according to and , where
- (3)
- Challenge: offers a message and two pairs of sender/receiver identities (), () to . Set , . Afterwards, utilizes a simulation algorithm to query , , , and :
- -
- When the -th tuple in is , the -th tuple in is , the -th tuple in is , and the -th tuple in is , executes the following operations:Firstly, randomly selects and searches for the tuple in . When has no such tuple, sets and . Subsequently, randomly selects , calculates , implicitly sets , obtains , and then, inserts a tuple in . is a valid random trapdoor according to and , whereSecondly, randomly selects , , , calculates , , , , , and .The above construction implicitly sets , where , . is the encryption of according to and , whereEventually, returns the corresponding challenge ciphertext and challenge trapdoor to .
- -
- Otherwise, is aborted by failure.
- (4)
- Phase2: makes issues like in Phase1.
- (5)
- Guess: answers a guess .
□
Analysis: It is obvious that the simulations of , , , , , and are perfect. Define , , , . Let and . Denote the queries , , , and as the event . Suppose as the event in which terminates upon the queries and being issued, as the event in which terminates upon the queries and being issued, as the event in which terminates upon the queries and being issued, as the event in which terminates upon the queries and being issued, and as the event in which terminates in the challenge phase. Clearly, implies , , , and , because the queries and cannot be issued, the queries and are unable to be issued, and the queries and are unable to be issued, and the queries and are unable to be issued. Thus, we obtain .
Denote the failure of to decrypt the legitimate ciphertext in as the event . Thus, .
Define . There is no greater over advantage that will gain in guessing x when does not happen because , , and are random oracles. Hence, . We obtain
With , we obtain
Subsequently, we obtain
Obviously, when occurs, the Gap-BDH assumption can certainly be addressed by . addresses the Gap-BDH assumption with advantage
Theorem 4.
For any , our IBME-ET scheme meets sUF-ID-CMA security on the basis of the Gap-BDH assumption.
More precisely, if is able to break our proposal with the advantage ϵ, we are able to conceive of a PPT algorithm to address the Gap-BDH assumption with the advantage where and denote the numbers of different queries to and , respectively.
Proof.
Given a Gap-BDH assumption instance , the task of is to calculate by interacting with as below:
- (1)
- Setup: randomly chooses , . randomly selects , calculates , , , and , sets , and delivers this to with . implicitly sets , because has no knowledge about a. preserves the and lists to simulate and . Afterwards, randomly selects .
- (2)
- Queries: answers ’s queries as below:
- : When , randomly selects , inserts into and into , and answers I. Otherwise, answers the Gap-BDH solution , defines and , inserts into and into , and answers I.
- : Suppose as the i-th different query. When , randomly selects , inserts a tuple into , returns . Otherwise, inserts a tuple into and returns .
- : performs a simulation algorithm to query . Subsequently, randomly selects , inserts a tuple into , and returns .
- : Suppose as the j-th different query. When , randomly selects , inserts a tuple into , and returns . Otherwise, inserts a tuple into and returns .
- : performs a simulation algorithm to query . Subsequently, searches for the tuple in and answers .
- : randomly chooses , inserts a tuple into , and answers R.
- : performs a simulation algorithm to query . Subsequently, randomly selects , inserts a tuple into , and returns .
- : randomly selects , inserts a tuple into , and returns .
- : randomly selects , inserts a tuple into , and returns .
- : performs a simulation algorithm to query . There is a tuple in . If , returns . Otherwise, is aborted by failure.
- : performs a simulation algorithm to query . There is a tuple in . If , returns . Otherwise, is aborted by failure.
- : Let . performs a simulation algorithm to query and . There is a tuple in . When , can query to obtain , calculates , and , and answers . Otherwise, executes the following operations:
- -
- When , can query to obtain , calculates , , and , calculates , randomly selects , and returns .
- -
- Otherwise, defines , , calculates , randomly selects , and returns .
- : Let . performs a simulation algorithm to query and . When , can query to obtain and returns . Otherwise, executes the following operations:
- -
- When , can query to obtain , randomly selects , , calculates , , , and , and then, returns , where , , , , .
- -
- Otherwise, defines , , randomly picks , , , calculates , and , inserts a tuple into , and then, returns , where , , , , and .
- : Let . performs a simulation algorithm to query and . When , can query to obtain and returns the outcome of the algorithm . Otherwise, executes the following operations:
- -
- When , can query to obtain , calculates , obtains by querying , calculates , , , , recovers by computing , calculates . If and hold, answers m; otherwise, answers ⊥.
- -
- Otherwise, defines , , calculates , obtains by querying , calculates , and searches for the corresponding tuple in . If there exists no such tuple in , randomly selects and inserts into . Afterwards, recovers by computing and calculates . If and hold, answers m; otherwise, answers ⊥.
- (3)
- Forgery: outputs a triple , where and .
□
Analysis: It is obvious that the simulations of , , , , , and are perfect. Define . Denote the query as the event . Denote the failure of to decrypt the legitimate ciphertext in as the event . Thus, .
Suppose E as the event for which , , and are legitimate. With and the lemma on the relationship between the chosen-identity attack and given identity attack [], we obtain .
Define . There is no greater over advantage that will forge a valid when does not happen because , , and are random oracles. Hence, . We obtain
Therefore, we obtain
Subsequently, we obtain
Obviously, when occurs, the Gap-BDH assumption can certainly be addressed by . addresses the Gap-BDH assumption with advantage
6. Performance Evaluation
We first give the functionality and security comparisons, then give the comparisons of the computational overhead and communication overhead.
In Table 1, we compare our proposed IBME-ET with the related schemes (i.e., IB-ME [], IBEET [,], and IBSC-ET []) in terms of functionality and security. It can be seen that the IB-ME scheme in [] ensures the confidentiality, authenticity, and anonymity of data stored in the cloud, but does not achieve CCA security nor provide equality test functionality without losing the confidentiality, authenticity, and anonymity of the data. The IBEET schemes in [,] ensure the confidentiality of the data, but neither offer the authenticity and anonymity of data, nor provide equality test functionality without losing the confidentiality, authenticity, and anonymity of the data. Moreover, although the scheme in [] was the first proposed IBEET scheme, it fails to achieve CCA security. Hence, the IBEET scheme that achieves CCA security was proposed in []. The IBSC-ET scheme in [] ensures the confidentiality and authenticity the data and achieves CCA security, but neither ensures the anonymity of data, nor provides the equality test functionality without losing the confidentiality, authenticity, and anonymity of the data. As a result, only our proposed IBME-ET can realize all the functionality and security, which not only ensures the confidentiality, authenticity, and anonymity of the data stored in the cloud and achieves CCA security, but also provides equality test functionality for ciphertexts generated under different identities without losing the confidentiality, authenticity, and anonymity of the data.
Table 1.
Comparison of functionality and security.
Note that the IB-ME scheme in [] implements only CPA security. This means that the ciphertexts are malleable. When a valid plaintext/ciphertext pair of the sender and receiver is given, an attacker can utilize it to fake a valid ciphertext of any message, in this way to break the authenticity of the ciphertext stored in the cloud. Moreover, the IB-ME scheme in [] cannot provide equality test functionality for ciphertexts. Obviously, the IB-ME scheme in [] is not applicable to cloud storage application scenarios. In addition, it was proven in [] that the computational overhead and communication overhead of the IBEET scheme in [] are comparable to those of the IBEET scheme in []; however, the IBEET scheme in [] achieves stricter CCA security while the IBEET scheme in [] only achieves CPA security. Therefore, we only compared our proposed IBME-ET with the most-related schemes (i.e., IBEET [] and IBSC-ET []) in terms of computational overhead and communication overhead.
Table 2 shows the computational overhead comparison, which theoretically analyzes the computational cost of our proposed scheme and the comparative schemes with regard to encryption key generation (indicated as SKGen ), decryption key generation (indicated as RKGen), encryption (indicated as Enc), decryption (indicated as Dec), authorization (indicated as Auth), and the equality test (indicated as Test). For the analysis, we concentrated on the operations that consumed the most time, including hash-to-point, bilinear pairing, and exponentiation. Notably, the authorization algorithms of the schemes in [,] have no computational cost. This is because both schemes directly use the partial decryption private key as the trapdoor regardless of anonymity. The communication overhead comparison is given in Table 3, which theoretically analyzes the communication cost of our proposed scheme and the comparative schemes with regard to the encryption private key, decryption private key, trapdoor, and ciphertext.
Table 2.
Comparison of computational overhead.
Table 3.
Comparison of communication overhead.
In order to compare the computational and communication overhead of our proposed scheme with the comparative schemes more intuitively, we used Charm 0.50 in Python 3.6.9 to implement these schemes. The experimental environment was configured as follows: Intel(R) Xeon(R) Platinum 8124M CPU @ 2.70 GHz (Intel Corporation, Santa Clara, CA, USA), 16 GB memory, and Ubuntu 18.03 LTS. The experiments were instantiated using the MNT224 curve in Charm and employed the Python module for the time measurements. Figure 3 shows the experimental computational overheads of these schemes, and Figure 4 shows the experimental communication overheads of these schemes.
Figure 3.
Computational overhead comparison with LLS+16 [] and XHH+20 [].
Figure 4.
Communication overhead comparison with LLS+16 [] and XHH+20 [].
From Table 1, Table 2 and Table 3 and Figure 3 and Figure 4, we can conclude that, with a small sacrifice in computational and communication efficiency, our IBME-ET scheme not only offers the confidentiality, authenticity, and anonymity of the data and achieves CCA security, but also provides equality test functionality for ciphertexts generated under different identities without losing the confidentiality, authenticity, and anonymity of the data. Other related schemes cannot support this feature.
7. Conclusions
In this paper, we presented the primitive of the IBME-ET, which not only offers the confidentiality, authenticity, and anonymity of data and achieves CCA security, but also provides equality test functionality for ciphertexts generated under different identities without losing the confidentiality, authenticity, and anonymity of the data. More precisely, we introduced the system model and definition of the IBME-ET. With respect to the confidentiality, authenticity, and anonymity, we formalized the security models for the IBME-ET. Finally, we proposed a concrete IBME-ET scheme, and our scheme was confirmed to be secure and practical by proving its security and evaluating its performance.
Author Contributions
Conceptualization, Z.Y. and X.L.; methodology, Z.Y.; validation, H.Q. and J.X.; writing—original draft, Z.Y. and X.L.; writing—review and editing, H.Q. and X.Z. All authors have read and agreed to the published version of the manuscript.
Funding
This research received no external funding.
Data Availability Statement
Data are contained within the article.
Conflicts of Interest
The authors declare no conflicts of interest.
References
- Boneh, D.; Di Crescenzo, G.; Ostrovsky, R.; Persiano, G. Public key encryption with keyword search. In Proceedings of the Advances in Cryptology—EUROCRYPT 2004, Interlaken, Switzerland, 2–6 May 2004; Springer: Berlin/Heidelberg, Germany, 2004; pp. 506–522. [Google Scholar]
- Yang, G.; Tan, C.H.; Huang, Q.; Wong, D.S. Probabilistic public key encryption with equality test. In Proceedings of the Topics in Cryptology—CT-RSA 2010, San Francisco, CA, USA, 1–5 March 2010; Springer: Berlin/Heidelberg, Germany, 2010; pp. 119–131. [Google Scholar]
- Ma, S. Identity-based encryption with outsourced equality test in cloud computing. Inf. Sci. 2015, 328, 389–402. [Google Scholar] [CrossRef]
- Lu, J.; Li, H.; Huang, J.; Ma, S.; Au, M.H.A.; Huang, Q. An Identity-Based Encryption with Equality Test scheme for healthcare social apps. Comput. Stand. Interfaces 2023, 87, 103759. [Google Scholar] [CrossRef]
- My HealtheVet. Available online: http://www.myhealth.va.gov (accessed on 22 December 2023).
- Vaanchig, N.; Qin, Z.; Ragchaasuren, B. Constructing secure-channel free identity-based encryption with equality test for vehicle-data sharing in cloud computing. Trans. Emerg. Telecommun. Technol. 2022, 33, e3896. [Google Scholar] [CrossRef]
- Xiong, H.; Hou, Y.; Huang, X.; Zhao, Y. Secure message classification services through identity-based signcryption with equality test towards the Internet of vehicles. Veh. Commun. 2020, 26, 100264. [Google Scholar] [CrossRef]
- Ohtaki, Y. Constructing a Searchable Encrypted Log Using Encrypted Inverted Indexes. In Proceedings of the 2005 International Conference on Cyberworlds, CW 2005, Singapore, 23–25 November 2005; pp. 130–138. [Google Scholar]
- Boneh, D.; Kushilevitz, E.; Ostrovsky, R.; Skeith, W.E. Public key encryption that allows PIR queries. In Proceedings of the Advances in Cryptology—CRYPTO 2007, Santa Barbara, CA, USA, 19–23 August 2007; Springer: Berlin/Heidelberg, Germany, 2007; pp. 50–67. [Google Scholar]
- Camenisch, J.; Kohlweiss, M.; Rial, A.; Sheedy, C. Blind and anonymous identity-based encryption and authorised private searches on public key encrypted data. In Proceedings of the Public Key Cryptography—PKC 2009, Irvine, CA, USA, 18–20 March 2009; Springer: Berlin/Heidelberg, Germany, 2009; pp. 196–214. [Google Scholar]
- Curtmola, R.; Garay, J.A.; Kamara, S.; Ostrovsky, R. Searchable symmetric encryption: Improved definitions and efficient constructions. In Proceedings of the ACM Conference on Computer and Communications Security, CCS 2006, Alexandria, VA, USA, 30 October–3 November 2006; pp. 79–88. [Google Scholar]
- Cash, D.; Jarecki, S.; Jutla, C.S.; Krawczyk, H.; Rosu, M.; Steiner, M. Highly-scalable searchable symmetric encryption with support for Boolean queries. In Proceedings of the Advances in Cryptology—CRYPTO 2013, Santa Barbara, CA, USA, 18–22 August 2013; Springer: Berlin/Heidelberg, Germany, 2013; pp. 353–373. [Google Scholar]
- Tang, Q. Public key encryption supporting plaintext equality test and user-specified authorization. Secur. Commun. Netw. 2012, 5, 1351–1362. [Google Scholar] [CrossRef]
- Ma, S.; Huang, Q.; Zhang, M.; Yang, B. Efficient public key encryption with equality test supporting flexible authorization. IEEE Trans. Inf. Forensic Secur. 2014, 10, 458–470. [Google Scholar] [CrossRef]
- Lee, H.T.; Ling, S.; Seo, J.H.; Wang, H. Semi-generic construction of public key encryption and identity-based encryption with equality test. Inf. Sci. 2016, 373, 419–440. [Google Scholar] [CrossRef]
- Lin, X.J.; Sun, L.; Qu, H. Generic construction of public key encryption, identity-based encryption and signcryption with equality test. Inf. Sci. 2018, 453, 111–126. [Google Scholar] [CrossRef]
- Li, N. Efficient equality test on identity-based ciphertexts supporting flexible authorization. Entropy 2023, 25, 362. [Google Scholar] [CrossRef] [PubMed]
- Boyen, X. Multipurpose Identity-Based Signcryption. In Proceedings of the Advances in Cryptology—CRYPTO 2003, Santa Barbara, CA, USA, 17–21 August 2003; Springer: Berlin/Heidelberg, Germany, 2003; pp. 383–399. [Google Scholar]
- Xiong, H.; Zhao, Y.; Hou, Y.; Huang, X.; Jin, C.; Wang, L.; Kumari, S. Heterogeneous Signcryption With Equality Test for IIoT Environment. IEEE Internet Things J. 2021, 8, 16142–16152. [Google Scholar] [CrossRef]
- Xiong, H.; Hou, Y.; Huang, X.; Zhao, Y.; Chen, C.M. Heterogeneous Signcryption Scheme from IBC to PKI with Equality Test for WBANs. IEEE Syst. J. 2022, 16, 2391–2400. [Google Scholar] [CrossRef]
- Hou, Y.; Huang, X.; Chen, Y.; Kumar, S.; Xiong, H. Heterogeneous signcryption scheme supporting equality test from PKI to CLC toward IoT. Trans. Emerg. Telecommun. Technol. 2021, 32, e4190. [Google Scholar] [CrossRef]
- Ateniese, G.; Francati, D.; Nuñez, D.; Venturi, D. Match Me if You Can: Matchmaking Encryption and Its Applications. In Proceedings of the Advances in Cryptology—CRYPTO 2019, Santa Barbara, CA, USA, 18–22 August 2019; Springer: Cham, Switzerland, 2019; pp. 701–731. [Google Scholar]
- Xu, S.; Ning, J.; Li, Y.; Zhang, Y.; Xu, G.; Huang, X.; Deng, R.H. Match in my way: Fine-grained bilateral access control for secure cloud-fog computing. IEEE Trans. Dependable Secur. Comput. 2020, 19, 1064–1077. [Google Scholar] [CrossRef]
- Sun, J.; Yuan, Y.; Tang, M.; Cheng, X.; Nie, X.; Aftab, M.U. Privacy-preserving bilateral fine-grained access control for cloud-enabled industrial IOT healthcare. IEEE Trans. Ind. Inform. 2021, 18, 6483–6493. [Google Scholar] [CrossRef]
- Chen, J.; Li, Y.; Wen, J.; Weng, J. Identity-Based Matchmaking Encryption from Standard Assumptions. In Proceedings of the Advances in Cryptology—ASIACRYPT 2022, Taipei, Taiwan, 5–9 December 2022; Springer: Cham, Switzerland, 2022; pp. 394–422. [Google Scholar]
- Wu, A.; Luo, W.; Weng, J.; Yang, A.; Wen, J. Fuzzy Identity-Based Matchmaking Encryption and Its Application. IEEE Trans. Inf. Forensic Secur. 2023, 18, 5592–5607. [Google Scholar] [CrossRef]
- Yan, Z.; Qu, H.; Zhang, X.; Xu, J.L.; Lin, X.J. Identity-based proxy matchmaking encryption for cloud-based anonymous messaging systems. J. Syst. Archit. 2023, 142, 102950. [Google Scholar] [CrossRef]
- Sun, J.; Xu, G.; Zhang, T.; Yang, X.; Alazab, M.; Deng, R.H. Privacy-Aware and Security-Enhanced Efficient Matchmaking Encryption. IEEE Trans. Inf. Forensic Secur. 2023, 18, 4345–4360. [Google Scholar] [CrossRef]
- Boyen, X. A tapestry of identity-based encryption: Practical frameworks compared. Int. J. Appl. Cryptogr. 2008, 1, 3–21. [Google Scholar] [CrossRef]
- Bellare, M.; Rogaway, P. Random oracles are practical: A paradigm for designing efficient protocols. In Proceedings of the ACM Conference on Computer and Communications Security, CCS 1993, Fairfax, VA, USA, 3–5 November 1993; ACM: New York, NY, USA, 1993; pp. 62–73. [Google Scholar]
- Tibouchi, M. Encyclopedia of Cryptography and Security; Springer: Boston, MA, USA, 2011. [Google Scholar]
- Franklin, J. Proof in Mathematics: An Introduction; Quakers Hill Press: Sydney, Australia, 1996. [Google Scholar]
- Choon, J.C.; Hee Cheon, J. An identity-based signature from gap Diffie-Hellman groups. In Proceedings of the 6th International Workshop on Practice and Theory in Public Key Cryptography, PKC 2002, Miami, FL, USA, 6–8 January 2002; Springer: Berlin/Heidelberg, Germany, 2002; pp. 18–30. [Google Scholar]
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2024 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).