SCIE, EI, Scopus, INSPEC, DBLP, CSCD, etc.
Citation: | Zhao Z, Wang BC, Gao W. Identity-based encryption with equality test supporting accountable authorization in cloud computing. JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, 40(1): 215−228, Jan. 2025. DOI: 10.1007/s11390-024-2933-y |
Identity-based encryption with equality test (IBEET) is proposed to check whether the underlying messages of ciphertexts, even those encrypted with different public keys, are the same or not without decryption. Since people prefer to encrypt before outsourcing their data for privacy protection nowadays, the research of IBEET on cloud computing applications naturally attracts attention. However, we claim that the existing IBEET schemes suffer from the illegal trapdoor sharing problem caused by the inherited key escrow problem of the Identity-Based Encryption (IBE) mechanism. In traditional IBEET, the private key generator (PKG) with the master secret key generates trapdoors for all authorized cloud servers. Considering the reality in practice, the PKG is usually not fully trusted. In this case, the Private-Key Generator (PKG) may generate, share, or even sell any trapdoor without any risk of being caught, or not being held accountable, which may lead to serious consequences such as the illegal sharing of a gene bank’s trapdoors. In this paper, to relieve the illegal trapdoor sharing problem in IBEET, we present a new notion, called IBEET Supporting Accountable Authorization (IBEET-AA). In IBEET-AA, if there is a disputed trapdoor, the generator will be distinguished among the PKG and suspected testers by an additional tracing algorithm. For the additional tracing function, except for the traditional indistinguishability (IND) and one-way (OW) security models in IBEET, we define three more security models to protect the tracing security against dishonest authorizers, PKG, and testers, respectively. Based on Gentry’s IBE scheme, we instantiate IBEET-AA and give a specific construction along with a formalized security proof with random oracles.
[1] |
Abdalla M, Bellare M, Catalano D, Kiltz E, Kohno T, Lange T, Malone-Lee J, Neven G, Paillier P, Shi H. Searchable encryption revisited: Consistency properties, relation to anonymous IBE, and extensions. Journal of Cryptology, 2008, 21(3): 350–391. DOI: 10.1007/S00145-007-9006-6.
|
[2] |
Gentry C. Fully homomorphic encryption using ideal lattices. In Proc. the 41st Annual ACM Symposium on Theory of Computing, May 31–Jun. 2, 2009, pp.169–178. DOI: 10.1145/1536414.1536440.
|
[3] |
Yang G, Tan C H, Huang Q, Wong D S. Probabilistic public key encryption with equality test. In Proc. the 10th Cryptographers’ Track at the RSA Conference on Topics in Cryptology, Mar. 2010, pp.119–131. DOI: 10.1007/978-3-642-11925-5_9.
|
[4] |
Ma S. Identity-based encryption with outsourced equality test in cloud computing. Information Sciences, 2016, 328: 389–402. DOI: 10.1016/J.INS.2015.08.053.
|
[5] |
Gentry C. Practical identity-based encryption without random oracles. In Proc. the 25th International Conference on the Theory and Applications of Cryptographic Techniques on Advances in Cryptology, May 28–Jun. 1, 2006, pp.445–464. DOI: 10.1007/11761679_27.
|
[6] |
Tang Q. Towards public key encryption scheme supporting equality test with fine-grained authorization. In Proc. the 16th Australisian Conference on Information Security and Privacy, Jul. 2011, pp.389–406. DOI: 10.1007/978-3-642-22497-3_25.
|
[7] |
Tang Q. Public key encryption supporting plaintext equality test and user-specified authorization. Security and Communication Networks, 2012, 5(12): 1351–1362. DOI: 10.1002/SEC.418.
|
[8] |
Ma S, Zhang M, Huang Q, Yang B. Public key encryption with delegated equality test in a multi-user setting. The Computer Journal, 2015, 58(4): 986–1002. DOI: 10.1093/COMJNL/BXU026.
|
[9] |
Zhang K, Chen J, Lee H T, Qian H, Wang H. Efficient public key encryption with equality test in the standard model. Theoretical Computer Science, 2019, 755: 65–80. DOI: 10.1016/J.TCS.2018.06.048.
|
[10] |
Wang Y, Pang H, Tran N H, Deng R H. CCA secure encryption supporting authorized equality test on ciphertexts in standard model and its applications. Information Sciences, 2017, 414: 289–305. DOI: 10.1016/J.INS.2017.06.008.
|
[11] |
Lee H T, Ling S, Seo J H, Wang H. Public key encryption with equality test from generic assumptions in the random oracle model. Information Sciences, 2019, 500: 15–33. DOI: 10.1016/J.INS.2019.05.026.
|
[12] |
Lin X J, Wang Q, Sun L, Qu H. Identity-based encryption with equality test and datestamp-based authorization mechanism. Theoretical Computer Science, 2021, 861: 117–132. DOI: 10.1016/J.TCS.2021.02.015.
|
[13] |
Qu H, Yan Z, Lin X J, Zhang Q, Sun L. Certificateless public key encryption with equality test. Information Sciences, 2018, 462: 76–92. DOI: 10.1016/J.INS.2018.06.025.
|
[14] |
Lin X J, Sun L, Qu H. Generic construction of public key encryption, identity-based encryption and signcryption with equality test. Information Sciences, 2018, 453: 111–126. DOI: 10.1016/J.INS.2018.04.035.
|
[15] |
Huang K, Tso R, Chen Y C. Somewhat semantic secure public key encryption with filtered-equality-test in the standard model and its extension to searchable encryption. Journal of Computer and System Sciences, 2017, 89: 400–409. DOI: 10.1016/J.JCSS.2017.06.001.
|
[16] |
Susilo W, Guo F, Zhao Z, Wu G. PKE-MET: Public-key encryption with multi-ciphertext equality test in cloud computing. IEEE Trans. Cloud Computing, 2022, 10(2): 1476–1488. DOI: 10.1109/TCC.2020.2990201.
|
[17] |
Zhao Z Z, Guo F, Wu G, Susilo W, Wang B. Secure infectious diseases detection system with IoT-based e-health platforms. IEEE Internet of Things Journal, 2022, 9(22): 22595–22607. DOI: 10.1109/JIOT.2022.3181582.
|
[18] |
Wu L, Zhang Y, Choo K K R, He D. Efficient and secure identity-based encryption scheme with equality test in cloud computing. Future Generation Computer Systems, 2017, 73: 22–31. DOI: 10.1016/J.FUTURE.2017.03.007.
|
[19] |
Li H, Huang Q, Ma S, Shen J, Susilo W. Authorized equality test on identity-based ciphertexts for secret data sharing via cloud storage. IEEE Access, 2019, 7: 25409–25421. DOI: 10.1109/ACCESS.2019.2899680.
|
[20] |
Ma S, Huang Q, Zhang M, Yang B. Efficient public key encryption with equality test supporting flexible authorization. IEEE Trans. on Information Forensics and Security, 2015, 10(3): 458–470. DOI: 10.1109/TIFS.2014.2378592.
|
[21] |
Lee H T, Ling S, Seo J H, Wang H. Semi-generic construction of public key encryption and identity-based encryption with equality test. Information Sciences, 2016, 373: 419–440. DOI: 10.1016/J.INS.2016.09.013.
|
[22] |
Lin X J, Sun L, Qu H, Zhang X. Public key encryption supporting equality test and flexible authorization without bilinear pairings. Computer Communications, 2021, 170: 190–199. DOI: 10.1016/J.COMCOM.2021.02.006.
|
[23] |
Lee H T, Ling S, Seo J H, Wang H, Youn T Y. Public key encryption with equality test in the standard model. Information Sciences, 2020, 516: 89–108. DOI: 10.1016/J.INS.2019.12.023.
|
[24] |
Boneh D, Boyen X. Short signatures without random oracles. In Proc. the International Conference on the Theory and Applications of Cryptographic Techniques on Advances in Cryptology, May 2004, pp.56–73. DOI: 10.1007/978-3-540-24676-3_4.
|
[25] |
Goyal V. Reducing trust in the PKG in identity based cryptosystems. In Proc. the 27th Annual International Cryptology Conference on Advances in Cryptology, Aug. 2007, pp.430–447. DOI: 10.1007/978-3-540-74143-5_24.
|
[26] |
Camenisch J. Group signature schemes and payment systems based on the discrete logarithm problem [Ph.D. Thesis]. ETH Zurich, 1998.
|