Advanced Search
Volume 42 Issue 11
Nov.  2020
Turn off MathJax
Article Contents
Yulei ZHANG, Wenjuan CHEN, Yongjie ZHANG, Xuewei ZHANG, Caifen WANG. Certificateless Puklic Key Encryption With Equality Test of Supporting Keyword Search[J]. Journal of Electronics & Information Technology, 2020, 42(11): 2713-2719. doi: 10.11999/JEIT190752
Citation: Yulei ZHANG, Wenjuan CHEN, Yongjie ZHANG, Xuewei ZHANG, Caifen WANG. Certificateless Puklic Key Encryption With Equality Test of Supporting Keyword Search[J]. Journal of Electronics & Information Technology, 2020, 42(11): 2713-2719. doi: 10.11999/JEIT190752

Certificateless Puklic Key Encryption With Equality Test of Supporting Keyword Search

doi: 10.11999/JEIT190752
Funds:  The National Natural Science Foundation of China(61662069), The Higher Educational Scientific Research Foundation of Gansu Province (2017A-003, 2018A-207)
  • Received Date: 2019-09-29
  • Rev Recd Date: 2020-04-23
  • Available Online: 2020-05-28
  • Publish Date: 2020-11-16
  • Public Key Encryption with Equality Test (PKEET) is an important method to achieve the equality test of ciphertexts which are generated by the different public key aiming to the same plaintext in cloud environment. In other words, it can tests the plaintext corresponding to the two ciphertext’s equivalence without decrypting the ciphertext, but does not supply the searchable function. Nowadays, the existing PKEET scheme takes directly the message to generate a trapdoor as the proof of equality test, which has low test accuracy and search efficiency. To solve the above problems, a certificateless public key encryption with equality test scheme supporting keyword search (CertificateLess Equality test EncrypTion with keyword Search, CLEETS) is proposed. The scheme determines whether it contains information needed by the user through the keyword search, then performs the equality test according to the search result, which can avoid invalid test. Then, it is proved that the scheme satisfies the indistinguishability of adaptive selection of keywords under the random oracle model. Finally, the comparison analyses of function and efficiency are performed. The results indicate the computation cost of CLEETS scheme is less efficient. Fortunately, it can realizes the function of keyword search in encryption with equality test, which can remedies the inefficiency.
  • loading
  • 张键红, 李鹏燕. 一种有效的云存储数据完整性验证方案[J]. 信息网络安全, 2017(3): 1–5. doi: 10.3969/j.issn.1671-1122.2017.03.001

    ZHANG Jianhong and LI Pengyan. An efficient data integrity verification scheme for cloud storage[J]. Netinfo Security, 2017(3): 1–5. doi: 10.3969/j.issn.1671-1122.2017.03.001
    MAYER-SCHONBERGER V and CUKIER K. Big data: A Revolution that Will Transform How We Live, Work and Think[M]. London: John Murray, 2013: 94–98.
    SONG D X, WAGNER D, and PERRIG A. Practical techniques for searches on encrypted data[C]. 2000 IEEE Symposium on Security and Privacy, Berkeley, USA, 2000: 44–55. doi: 10.1109/SECPRI.2000.848445.
    BONEH D, DI CRESCENZO G, OSTROVSKY R, et al. Public key encryption with keyword search[C]. International Conference on the Theory and Applications of Cryptographic Techniques, Interlaken, Switzerland, 2004: 506–522. doi: 10.1007/978-3-540-24676-3_30.
    江明明, 郭宇燕, 余磊, 等. 有效的标准模型下格上基于身份的代理重加密[J]. 电子与信息学报, 2019, 41(1): 61–66. doi: 10.11999/JEIT180146

    JIANG Mingming, GUO Yuyan, YU Lei, et al. Efficient identity-based proxy re-encryption on lattice in the standard model[J]. Journal of Electronics &Information Technology, 2019, 41(1): 61–66. doi: 10.11999/JEIT180146
    PENG Yanguo, CUI Jiangtao, PENG Changgen, et al. Certificateless public key encryption with keyword search[J]. China Communications, 2014, 11(11): 100–113. doi: 10.1109/CC.2014.7004528
    MA Mimi, HE Debiao, KUMAR N, et al. Certificateless searchable public key encryption scheme for industrial internet of things[J]. IEEE Transactions on Industrial Informatics, 2018, 14(2): 759–767. doi: 10.1109/TII.2017.2703922
    MA Mimi, HE Debiao, KHAN M K, et al. Certificateless searchable public key encryption scheme for mobile healthcare system[J]. Computers & Electrical Engineering, 2018, 65: 413–424. doi: 10.1016/j.compeleceng.2017.05.014
    张玉磊, 刘祥震, 郎晓丽, 等. 云存储环境下多服务器的密钥聚合可搜索加密方案[J]. 电子与信息学报, 2019, 41(3): 674–679. doi: 10.11999/JEIT180418

    ZHANG Yulei, LIU Xiangzhen, LANG Xiaoli, et al. Multi-server key aggregation searchable encryption scheme in cloud environment[J]. Journal of Electronics &Information Technology, 2019, 41(3): 674–679. doi: 10.11999/JEIT180418
    张玉磊, 刘文静, 刘祥震, 等. 基于授权的多服务器可搜索密文策略属性基加密方案[J]. 电子与信息学报, 2019, 41(8): 1808–1814. doi: 10.11999/JEIT180944

    ZHANG Yulei, LIU Wenjing, LIU Xiangzhen, et al. Searchable multi-server CP-ABE scheme based on authorization[J]. Journal of Electronics &Information Technology, 2019, 41(8): 1808–1814. doi: 10.11999/JEIT180944
    YANG Guomin, TAN C H, HUANG Qiong, et al. Probabilistic public key encryption with equality test[C]. Cryptographers’ Track at the RSA Conference 2010, San Francisco, USA, 2010: 119–131. doi: 10.1007/978-3-642-11925-5_9.
    TANG Qiang. Towards public key encryption scheme supporting equality test with fine-grained authorization[C]. The 16th Australasian Conference on Information Security and Privacy, Melbourne, Australia, 2011: 389–406.
    TANG Qiang. Public key encryption supporting plaintext equality test and user-specified authorization[J]. Security and Communication Networks, 2012, 5(12): 1351–1362. doi: 10.1002/sec.418
    TANG Qiang. Public key encryption schemes supporting equality test with authorisation of different granularity[J]. International Journal of Applied Cryptography, 2012, 2(4): 304–321. doi: 10.1504/IJACT.2012.048079
    MA Sha, HUANG Qiong, ZHANG Mingwu, et al. Efficient public key encryption with equality test supporting flexible authorization[J]. IEEE Transactions on Information Forensics and Security, 2015, 10(3): 458–470. doi: 10.1109/TIFS.2014.2378592
    MA Sha. Identity-based encryption with outsourced equality test in cloud computing[J]. Information Sciences, 2016, 328: 389–402. doi: 10.1016/j.ins.2015.08.053
    QU Haipeng, YAN Zhen, LIN Xijun, et al. Certificateless public key encryption with equality test[J]. Information Sciences, 2018, 462: 76–92. doi: 10.1016/j.ins.2018.06.025
    HUANG Kaibin, TSO R, CHEN Yuchi, et al. PKE-AET: Public key encryption with authorized equality test[J]. The Computer Journal, 2015, 58(10): 2686–2697. doi: 10.1093/comjnl/bxv025
    LEE H T, LING San, SEO J H, et al. Semi-generic construction of public key encryption and identity-based encryption with equality test[J]. Information Sciences, 2016, 373: 419–440. doi: 10.1016/j.ins.2016.09.013
    The pairing-based cryptography library[EB/OL]. http://crypto.stanford.edu/pbc/, 2015.
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Figures(1)  / Tables(3)

    Article Metrics

    Article views (1689) PDF downloads(93) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return