全部 标题 作者
关键词 摘要

OALib Journal期刊
ISSN: 2333-9721
费用:99美元

查看量下载量

相关文章

更多...

Parallel Key Insulated ID-Based Public Key Cryptographic Primitive with Outsourced Equality Test

DOI: 10.4236/jcc.2020.812018, PP. 197-213

Keywords: Identity-Based Encryption, Equality Test, Parallel Key-Insulated

Full-Text   Cite this paper   Add to My Lib

Abstract:

Parallel key-insulation allows the use of multiple helper keys to protect private decryption keys during secret decryption key updates. This approach prevents decryption key leakage or exposure in insecure environment. We combined parallel key-insulated encryption (PKIE) with multiple helper keys and identity-based encryption with the equality test (IBE-ET) to obtain parallel key insulated ID-based public key encryption with outsourced equivalent test (PKI-IBPKE-ET). The scheme inherits the advantages of identity-based encryption (IBE), which simplifies certificate management for public key encryption. Furthermore, the parallel key-insulation with multiple helper mechanism was introduced in our scheme, which perfectly reduced the possibility of helper key exposure. Our scheme will enable the protection and periodic update of decryption keys in insecure environment. Our scheme achieves a weak indistinguishable identity chosen ciphertext (W-IND-ID-CCA) security in the random oracle model. Ultimately, it is observed that our scheme is feasible and practical through the experimental simulation and theoretical analysis.

References

[1]  Cao, X., Li, H., Dang, L. and Lin, Y. (2017) A Two-Party Privacy Preserving Set Intersection Protocol against Malicious Users in Cloud Computing. Computer Standards and Interfaces, 54, 41-45.
https://doi.org/10.1016/j.csi.2016.08.004
[2]  Boneh, D. and Franklin, M. (2001) Identity-Based Encryption from the Weil Pairing. In: Annual International Cryptology Conference, Springer, Berlin, 213-229.
https://doi.org/10.1007/3-540-44647-8_13
[3]  Yang, G., Tan, C.H., Huang, Q. and Wong, D.S. (2010) Probabilistic Public Key Encryption with Equality Test. In: Cryptographers’ Track at the RSA Conference, Springer, Berlin, 119-131.
https://doi.org/10.1007/978-3-642-11925-5_9
[4]  Lipmaa, H. (2003) Verifiable Homomorphic Oblivious Transfer and Private Equality Test. In: International Conference on the Theory and Application of Cryptology and Information Security, Springer, Berlin, 416-433.
https://doi.org/10.1007/978-3-540-40061-5_27
[5]  Tang, Q. (2012) Public Key Encryption Schemes Supporting Equality Test with Authorisation of Different Granularity. International Journal of Applied Cryptography, 2, 304-321.
https://doi.org/10.1504/IJACT.2012.048079
[6]  Wu, L., Zhang, Y., Choo, K.K.R. and He, D. (2017) Efficient Identity-Based Encryption Scheme with Equality Test in Smart City. IEEE Transactions on Sustainable Computing, 3, 44-55.
https://doi.org/10.1109/TSUSC.2017.2734110
[7]  Lee, H.T., Wang, H. and Zhang, K. (2018) Security Analysis and Modification of ID-Based Encryption with Equality Test from ACISP 2017. In: Australasian Conference on Information Security and Privacy, Springer, Cham, 780-786.
https://doi.org/10.1007/978-3-319-93638-3_46
[8]  Ma, S. (2016) Identity-Based Encryption with Outsourced Equality Test in Cloud Computing. Information Sciences, 328, 389-402.
https://doi.org/10.1016/j.ins.2015.08.053
[9]  Dodis, Y., Katz, J., Xu, S. and Yung, M. (2002) Key-Insulated Public Key Cryptosystems. In: International Conference on the Theory and Applications of Cryptographic Techniques, Springer, Berlin, 65-82.
https://doi.org/10.1007/3-540-46035-7_5
[10]  Bellare, M. and Palacio, A. (2006) Protecting against Key-Exposure: Strongly Key-Insulated Encryption with Optimal Threshold. Applicable Algebra in Engineering, Communication and Computing, 16, 379-396.
https://doi.org/10.1007/s00200-005-0183-y
[11]  Wang, Y., Yan, D., Li, F. and Xiong, H. (2017) A Key-Insulated Proxy Re-Encryption Scheme for Data Sharing in a Cloud Environment. IJ Network Security, 19, 623-630.
[12]  He, L., Yuan, C., Xiong, H. and Qin, Z. (2017) An Efficient and Provably Secure Certificateless Key Insulated Encryption with Applications to Mobile Internet. IJ Network Security, 19, 940-949.
[13]  Hanaoka, Y., Hanaoka, G., Shikata, J. and Imai, H. (2005) Identity-Based Hierarchical Strongly Key-Insulated Encryption and Its Application. In: International Conference on the Theory and Application of Cryptology and Information Security, Springer, Berlin, 495-514.
https://doi.org/10.1007/11593447_27
[14]  Libert, B., Quisquater, J.J. and Yung, M. (2007) Parallel Key-Insulated Public Key Encryption without Random Oracles. In: International Workshop on Public Key Cryptography, Springer, Berlin, 298-314.
https://doi.org/10.1007/978-3-540-71677-8_20
[15]  Hanaoka, G., Hanaoka, Y. and Imai, H. (2006) Parallel Key-Insulated Public Key Encryption. In: International Workshop on Public Key Cryptography, Springer, Berlin, 105-122.
https://doi.org/10.1007/11745853_8
[16]  Weng, J., Liu, S., Chen, K. and Ma, C. (2006) Identity-Based Parallel Key-Insulated Encryption without Random Oracles: Security Notions and Construction. In: International Conference on Cryptology in India, Springer, Berlin, 409-423.
https://doi.org/10.1007/11941378_29
[17]  Ren, Y. and Gu, D. (2010) CCA2 Secure (Hierarchical) Identity-Based Parallel Key-Insulated Encryption without Random Oracles. Journal of Systems and Software, 83, 153-162.
https://doi.org/10.1016/j.jss.2009.07.046
[18]  Ren, Y., Wang, S. and Zhang, X. (2013) Practical Parallel Key-Insulated Encryption with Multiple Helper Keys. Computers and Mathematics with Applications, 65, 1403-1412.
https://doi.org/10.1016/j.camwa.2012.01.032
[19]  Boneh, D., Di Crescenzo, G., Ostrovsky, R. and Persiano, G. (2004) Public Key Encryption with Keyword Search. In: International Conference on the Theory and Applications of Cryptographic Techniques, Springer, Berlin, 506-522.
https://doi.org/10.1007/978-3-540-24676-3_30
[20]  Xu, P., Jin, H., Wu, Q. and Wang, W. (2012) Public-Key Encryption with Fuzzy Keyword Search: A Provably Secure Scheme under Keyword Guessing Attack. IEEE Transactions on Computers, 62, 2266-2277.
https://doi.org/10.1109/TC.2012.215
[21]  Yu, Y., Ni, J., Yang, H., Mu, Y. and Susilo, W. (2014) Efficient Public Key Encryption with Revocable Keyword Search. Security and Communication Networks, 7, 466-472.
https://doi.org/10.1002/sec.790
[22]  Qu, H., Yan, Z., Lin, X. J., Zhang, Q. and Sun, L. (2018) Certificateless Public Key Encryption with Equality Test. Information Sciences, 462, 76-92.
https://doi.org/10.1016/j.ins.2018.06.025
[23]  Zhang, K., Chen, J., Lee, H.T., Qian, H. and Wang, H. (2019) Efficient Public Key Encryption with Equality Test in the Standard Model. Theoretical Computer Science, 755, 65-80.
https://doi.org/10.1016/j.tcs.2018.06.048
[24]  Lin, X.J., Sun, L. and Qu, H. (2018) Generic Construction of Public Key Encryption, Identity-Based Encryption and Signcryption with Equality Test. Information Sciences, 453, 111-126.
https://doi.org/10.1016/j.ins.2018.04.035
[25]  Waters, B. (2005) Efficient Identity-Based Encryption without Random Oracles. In: Annual International Conference on the Theory and Applications of Cryptographic Techniques, Springer, Berlin, 114-127.
https://doi.org/10.1007/11426639_7
[26]  Alornyo, S., Asante, M., Hu, X. and Mireku, K.K. (2018) Encrypted Traffic Analytic Using Identity Based Encryption with Equality Test for Cloud Computing. 2018 IEEE 7th International Conference on Adaptive Science and Technology, Ghana, 22-24 August 2018, 1-4.
https://doi.org/10.1109/ICASTECH.2018.8507063
[27]  Wu, L., Zhang, Y., Choo, K.K.R. and He, D. (2017) Efficient and Secure Identity-Based Encryption Scheme with Equality Test in Cloud Computing. Future Generation Computer Systems, 73, 22-31.
https://doi.org/10.1016/j.future.2017.03.007
[28]  Lee, H.T., Ling, S., Seo, J.H. and Wang, H. (2016) Semi-Generic Construction of Public Key Encryption and Identity-Based Encryption with Equality Test. Information Sciences, 373, 419-440.
https://doi.org/10.1016/j.ins.2016.09.013
[29]  Wu, T., Ma, S., Mu, Y. and Zeng, S. (2017) ID-Based Encryption with Equality Test against Insider Attack. In: Australasian Conference on Information Security and Privacy, Springer, Cham, 168-183.
https://doi.org/10.1007/978-3-319-60055-0_9
[30]  Li, J., Zhang, F. and Wang, Y. (2006) A Strong Identity Based Key-Insulated Cryptosystem. In: International Conference on Embedded and Ubiquitous Computing, Springer, Berlin, 352-361.
https://doi.org/10.1007/11807964_36
[31]  Lynn, B. (2013) PBC Library.
https://crypto.stanford.edu/pbc/
[32]  Alornyo, S., Zhao, Y., Zhu, G. and Xiong, H. (2020) Identity Based Key-Insulated Encryption with Outsourced Equality Test. IJ Network Security, 22, 257-264.

Full-Text

Contact Us

service@oalib.com

QQ:3279437679

WhatsApp +8615387084133