Skip to main content
Log in

A new lightweight public key encryption with equality test for cloud storage

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Public key encryption with equality test (PKEET) can test if two ciphertexts generated from different public keys contain the same message without decryption. In the application of cloud storage, PKEET could be used to search on encrypted data. Currently, there have been many researches about security, efficiency, and function of PKEET. After analyzing the ciphertext sizes in the existing proposals, we find that the ciphertext sizes in PKEET schemes are usually large. In this case, it will bring storage burden for the cloud server. To address the problem, in this paper, we introduce a new notion of lightweight public key encryption with equality test (L-PKEET). Then we present a concrete construction of L-PKEET. Furthermore, we demonstrate that L-PKEET can reduce ciphertext sizes efficiently. In terms of the computation cost and ciphertext size, we compare L-PKEET with related schemes which also achieve four kinds of authorization. The comparison results show that L-PKEET is more efficient in terms of encryption, decryption, and test algorithms. Regarding the adversaries with/without trapdoor, we theoretically prove that L-PKEET can meet OW-CCA security and IND-CCA security, respectively.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6

Similar content being viewed by others

Data Availability

Data sharing not applicable to this article as no datasets were generated or analyzed during the current study.

References

  1. Shen J, Liu DZ, He DB et al (2020) Algebraic signatures-based data integrity auditing for efficient data dynamics in cloud computing. IEEE Trans Sustain Comput 5(2):161–173

    Google Scholar 

  2. Shen J, Zhou TQ, He DB et al (2019) Block design-based key agreement for group data sharing in cloud computing. IEEE Trans Dependable Secur Comput 16(6):996–1010

    Google Scholar 

  3. Yu Y, Li YN, Yang B et al (2020) Attribute-based cloud data integrity auditing for secure outsourced storage. IEEE Trans Emerg Top Comput 8(2):377–390

    Google Scholar 

  4. Qu HP, Yan Z, Lin XJ et al (2018) Certificateless public key encryption with equality test. Inf Sci 462:76–92

    MathSciNet  Google Scholar 

  5. Wang YJ, Pang HH, Deng RH et al (2019) Securing messaging services through efficient signcryption with designated equality test. Inf Sci 490:146–165

    ADS  Google Scholar 

  6. Yu Y, Shi JB, Li HL et al (2020) Key-policy attribute-based encryption with keyword search in virtualized environments. IEEE Trans Dependable Secur Comput 38(6):1242–1251

    Google Scholar 

  7. Caruccio L, Desiato D, Polese G et al (2020) GDPR compliant information confidentiality preservation in big data. IEEE Access 8:205034–205050

    Google Scholar 

  8. Desiato D, Tortora G (2018) A methodology for GDPR compliant data processing. In Proc of the 26th Ita Sym on Adv Datab Syst, volume: 2161

  9. Song DX, Wagner D, Perrig A (2000) Practical techniques for searches on encrypted data. In IEEE Symp Secur Privacy 44–55

  10. Boneh D, Crescenzo GD, Ostrovsky R et al (2004) Public key encryption with keyword search. In Proc Int Conf Theory Appl Cryptograph Techn 3027:506–522

    MathSciNet  Google Scholar 

  11. Abdalla M, Bellare M, Catalano D et al (2008) Searchable encryption revisited: consistency properties, relation to anonymous IBE, and extensions. J Cryptology 21(3):350–391

    MathSciNet  Google Scholar 

  12. Yang GM, Tan CH, Huang Q et al (2010) Probabilistic public key encryption with equality test. In Proc. Cryptographers’s Track RSA Conf 5985:119–131

    MathSciNet  Google Scholar 

  13. Li HB, Huang Q, Ma S et al (2019) Authorized equality test on identity-based ciphertexts for secret data sharing via cloud storage. IEEE Access 7:25409–25421

    Google Scholar 

  14. Lee HT, Ling S, Seo JH et al (2020) Public key encryption with equality test in the standard model. Inf Sci 516:89–108

    MathSciNet  Google Scholar 

  15. Ma S, Huang Q, Zhang MW et al (2015) Efficient public key encryption with equality test supporting flexible authorization. IEEE Trans Inf Forensics Secur 10(3):458–470

    Google Scholar 

  16. Tang Q (2012) Public key encryption supporting plaintext equality test and user-specified authorization. Secur Commun Networks 5(12):1351–1362

    Google Scholar 

  17. Huang KB, Tso R, Chen YC et al (2014) A new public key encryption with equality test. In Int Conf Netw Syst Secur 8792:550-C557

    Google Scholar 

  18. Ling YH, Ma S, Huang Q et al (2020) Group public key encryption with equality test against offline message recovery attack. Inf Sci 510:16–32

    MathSciNet  Google Scholar 

  19. Wu LB, Zhang YB, Choo KKR et al (2017) Efficient and secure identity-based encryption scheme with equality test in cloud computing. Future Gener Comput Syst 73:22–31

    Google Scholar 

  20. Tang Q (2011) Towards public key encryption scheme supporting equality test with fine-grained authorization. In Proc Austral Conf Inf Secur Privacy 6812:389–406

    Google Scholar 

  21. Ma S, Zhang MW, Huang Q et al (2015) Public key encryption with delegated equality test in a multi-user setting. Comput J 58(4):986–1002

    Google Scholar 

  22. Wang YJ, Pang HH, Tran NH et al (2017) CCA Secure encryption supporting authorized equality test on ciphertexts in standard model and its applications. Inf Sci 414:289–305

    Google Scholar 

  23. Ma S (2016) Identity-based encryption with outsourced equality test in cloud computing. Inf Sci 328:389–402

    Google Scholar 

  24. Wang YJ, Pang HH, Deng RH et al (2019) Securing messaging services through efficient signcryption with designated equality test. Inf Sci 490:146–165

    ADS  Google Scholar 

  25. Lee HT, Ling S, Seo JH, et al (2016) CCA2 attack and modification of Huang et al.’s public key encryption with authorized equality test. Comput J 59(11):1689–1694

  26. Lin H, Zhao Z, Gao F et al (2021) Lightweight public key encryption with equality test supporting partial authorization in cloud storage. Comput J 64(8):1226–1238

    MathSciNet  Google Scholar 

  27. Lin H, Gao F, Zhang H et al (2022) Public key encryption with equality test supporting flexible designated authorization in cloud storage. IEEE Syst J 16(1):1460–1470

    ADS  Google Scholar 

  28. Susilo W, Guo FC, Zhao Z et al (2022) PKE-MET: Public-key encryption with multi-ciphertext equality test in cloud computing. IEEE Trans Cloud Comput 10(2):1476–1488

    Google Scholar 

  29. Zhao Z, Guo FC, Wu G et al (2022) Secure infectious diseases detection system with IoT-based e-health platforms. IEEE Internet Things J 9(22):22595–22607

    Google Scholar 

  30. Al-Zubaidie M, Zhang ZW, Zhang J (2019) RAMHU: A new robust lightweight scheme for mutual users authentication in healthcare applications. Secur Commun Networks 3263902(1–3263902):26

    Google Scholar 

  31. Murillo-Escobar MÁ, Quintana-Ibarra JA, Cruz-Hernández C et al (2023) Biosignal encryption algorithm based on Ushio chaotic map for e-health. Multim Tools Appl 82(15):23373–23399

    Google Scholar 

  32. Al-Zubaidie M (2023) Implication of lightweight and robust hash function to support key exchange in health sensor networks. Symmetry 15(1):152

    ADS  Google Scholar 

  33. Zhu HJ, Wang LC, Ahmad H, et al (2017) Pairingfree equality test over short ciphertexts. Int J Distributed Sens Networks 13(6) https://doi.org/10.1177/1550147717715605

  34. Lin XJ, Qu HP, Zhang XS (2021) Public key encryption supporting equality test and flexible authorization without bilinear pairings. Comput Commun 170:190–199

    Google Scholar 

  35. Shen XY, Wang BC, Wang LC et al (2022) Group public key encryption supporting equality test without bilinear pairings. Inf Sci 605:202–224

    Google Scholar 

  36. Wu LB, Zhang YB, Choo KKR et al (2017) Efficient identity-based encryption scheme with equality test in smart city. IEEE Trans Sustain Comput 3(1):44–55

    Google Scholar 

  37. Tang Q (2012) Public key encryption schemes supporting equality test with authorization of different granularity. Int J Appl Cryptography 2(4):304–321

    MathSciNet  Google Scholar 

  38. Zhao M, Ding Y, Tang SJ et al (2022) Public key encryption with authorized equality test on outsourced ciphertexts for cloud-assisted IoT in dual server model. Wirel Commun Mob Comput. https://doi.org/10.1155/2022/4462134

    Article  Google Scholar 

  39. Wu T, Ma S, Mu Y et al (2017) ID-based encryption with equality test against insider attack. In Proc Austral Conf Inf Secur Privacy 10342:168–183

  40. Ling YH, Ma S, Huang Q et al (2019) Group ID-based encryption with equality test. In Proc Austral Conf Inf Secur Privacy 11547:39–57

  41. Shor PW (1999) Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer. SIAM Rev 41(2):303–332

    MathSciNet  ADS  Google Scholar 

  42. Duong DH, Fukushima K, Kiyomoto S et al (2019) A lattice-based public key encryption with equality test in standard model. In Proc Austral Conf Inf Secur Privacy 11547:138–155

  43. Duong DH, Le HQ, Roy PS et al (2019) Lattice-based IBE with equality test in standard model. In Proc Int Conf ProvSec 11821:19–40

  44. Roy PS, Duong DH, Susilo W et al (2022) Lattice-based public-key encryption with equality test supporting flexible authorization in standard model. Theor Comput Sci 929:124–139

    MathSciNet  Google Scholar 

  45. Duong DH, Roy PS, Susilo W et al (2022) Chosen-ciphertext lattice-based public key encryption with equality test in standard model. Theor Comput Sci 905:31–53

    MathSciNet  Google Scholar 

  46. Shen XY, Wang LC, Zhu HJ et al (2020) A multivariate public key encryption scheme with equality test. IEEE Access 8:75463–75472

    Google Scholar 

  47. Zhou ZJ, Liao YJ, Zhang GL et al (2022) A fully secure identity based encryption scheme with equality test in the standard model in cloud computing. Int J Netw Secur 24(5):841–854

    Google Scholar 

  48. Deng XT, Qian HF (2022) Group public key encryption with equality test under standard model. Secur Commun Networks. https://doi.org/10.1155/2022/4605685

    Article  Google Scholar 

  49. Wang YH, Cui YZ, Huang Q et al (2020) Attribute-based equality test over encrypted data without random oracles. IEEE Access 8:32891–32903

    Google Scholar 

  50. Cui YZ, Huang Q, Huang JY et al (2019) Ciphertext-policy attribute-based encrypted data equality test and classification. Comput J 62(8):1166–1177

    MathSciNet  Google Scholar 

  51. Wang Q, Peng L, Xiong H et al (2017) Ciphertext-policy attribute-based encryption with delegated equality test in cloud computing. IEEE Access 6:760–771

    Google Scholar 

  52. Wang YJ, Pang HH, Deng RH et al (2020) Secure server-aided data sharing clique with attestation. Inf Sci 522:80–98

    MathSciNet  Google Scholar 

  53. Li WC, Xia CH, Wang C et al (2022) Secure and temporary access delegation with equality test for cloud-assisted IoV. IEEE Trans Intell Transp Syst 23(11):20187–20201

    Google Scholar 

  54. Blaze M, Bleumer G, Strauss M (1998) Divertible protocols and atomic proxy cryptography. In Proc Int Conf Theory Appl Cryptograph Techn 1403:127–144

  55. Akinyele JA, Garman C, Miers I et al (2013) Charm: a framework for rapidly prototyping cryptosystems. J Cryptogr Eng 3(2):111–128

    Google Scholar 

Download references

Acknowledgements

This work is supported by National Key R &D Program of China (Grant Nos. 2021YFB3101300, 2021YFB3101302, 2021YFB3101305), and Major Programs of the National Social Science Foundation of China(Grant No. 22 &ZD147).

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Gaohua Zhao or Wei Jiang.

Ethics declarations

Conflicts of interest statement

The authors declared that they have no conflicts of interest in this work. We declare that we do not have any commercial or associative interest that represents a conflict of interest in connection with the work submitted.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Lin, H., Zhao, G., Song, S. et al. A new lightweight public key encryption with equality test for cloud storage. Multimed Tools Appl 83, 28947–28968 (2024). https://doi.org/10.1007/s11042-023-16540-1

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-023-16540-1

Keywords

Navigation