Abstract
Public key encryption with equality test (PKEET) can test if two ciphertexts generated from different public keys contain the same message without decryption. In the application of cloud storage, PKEET could be used to search on encrypted data. Currently, there have been many researches about security, efficiency, and function of PKEET. After analyzing the ciphertext sizes in the existing proposals, we find that the ciphertext sizes in PKEET schemes are usually large. In this case, it will bring storage burden for the cloud server. To address the problem, in this paper, we introduce a new notion of lightweight public key encryption with equality test (L-PKEET). Then we present a concrete construction of L-PKEET. Furthermore, we demonstrate that L-PKEET can reduce ciphertext sizes efficiently. In terms of the computation cost and ciphertext size, we compare L-PKEET with related schemes which also achieve four kinds of authorization. The comparison results show that L-PKEET is more efficient in terms of encryption, decryption, and test algorithms. Regarding the adversaries with/without trapdoor, we theoretically prove that L-PKEET can meet OW-CCA security and IND-CCA security, respectively.
Similar content being viewed by others
Data Availability
Data sharing not applicable to this article as no datasets were generated or analyzed during the current study.
References
Shen J, Liu DZ, He DB et al (2020) Algebraic signatures-based data integrity auditing for efficient data dynamics in cloud computing. IEEE Trans Sustain Comput 5(2):161–173
Shen J, Zhou TQ, He DB et al (2019) Block design-based key agreement for group data sharing in cloud computing. IEEE Trans Dependable Secur Comput 16(6):996–1010
Yu Y, Li YN, Yang B et al (2020) Attribute-based cloud data integrity auditing for secure outsourced storage. IEEE Trans Emerg Top Comput 8(2):377–390
Qu HP, Yan Z, Lin XJ et al (2018) Certificateless public key encryption with equality test. Inf Sci 462:76–92
Wang YJ, Pang HH, Deng RH et al (2019) Securing messaging services through efficient signcryption with designated equality test. Inf Sci 490:146–165
Yu Y, Shi JB, Li HL et al (2020) Key-policy attribute-based encryption with keyword search in virtualized environments. IEEE Trans Dependable Secur Comput 38(6):1242–1251
Caruccio L, Desiato D, Polese G et al (2020) GDPR compliant information confidentiality preservation in big data. IEEE Access 8:205034–205050
Desiato D, Tortora G (2018) A methodology for GDPR compliant data processing. In Proc of the 26th Ita Sym on Adv Datab Syst, volume: 2161
Song DX, Wagner D, Perrig A (2000) Practical techniques for searches on encrypted data. In IEEE Symp Secur Privacy 44–55
Boneh D, Crescenzo GD, Ostrovsky R et al (2004) Public key encryption with keyword search. In Proc Int Conf Theory Appl Cryptograph Techn 3027:506–522
Abdalla M, Bellare M, Catalano D et al (2008) Searchable encryption revisited: consistency properties, relation to anonymous IBE, and extensions. J Cryptology 21(3):350–391
Yang GM, Tan CH, Huang Q et al (2010) Probabilistic public key encryption with equality test. In Proc. Cryptographers’s Track RSA Conf 5985:119–131
Li HB, Huang Q, Ma S et al (2019) Authorized equality test on identity-based ciphertexts for secret data sharing via cloud storage. IEEE Access 7:25409–25421
Lee HT, Ling S, Seo JH et al (2020) Public key encryption with equality test in the standard model. Inf Sci 516:89–108
Ma S, Huang Q, Zhang MW et al (2015) Efficient public key encryption with equality test supporting flexible authorization. IEEE Trans Inf Forensics Secur 10(3):458–470
Tang Q (2012) Public key encryption supporting plaintext equality test and user-specified authorization. Secur Commun Networks 5(12):1351–1362
Huang KB, Tso R, Chen YC et al (2014) A new public key encryption with equality test. In Int Conf Netw Syst Secur 8792:550-C557
Ling YH, Ma S, Huang Q et al (2020) Group public key encryption with equality test against offline message recovery attack. Inf Sci 510:16–32
Wu LB, Zhang YB, Choo KKR et al (2017) Efficient and secure identity-based encryption scheme with equality test in cloud computing. Future Gener Comput Syst 73:22–31
Tang Q (2011) Towards public key encryption scheme supporting equality test with fine-grained authorization. In Proc Austral Conf Inf Secur Privacy 6812:389–406
Ma S, Zhang MW, Huang Q et al (2015) Public key encryption with delegated equality test in a multi-user setting. Comput J 58(4):986–1002
Wang YJ, Pang HH, Tran NH et al (2017) CCA Secure encryption supporting authorized equality test on ciphertexts in standard model and its applications. Inf Sci 414:289–305
Ma S (2016) Identity-based encryption with outsourced equality test in cloud computing. Inf Sci 328:389–402
Wang YJ, Pang HH, Deng RH et al (2019) Securing messaging services through efficient signcryption with designated equality test. Inf Sci 490:146–165
Lee HT, Ling S, Seo JH, et al (2016) CCA2 attack and modification of Huang et al.’s public key encryption with authorized equality test. Comput J 59(11):1689–1694
Lin H, Zhao Z, Gao F et al (2021) Lightweight public key encryption with equality test supporting partial authorization in cloud storage. Comput J 64(8):1226–1238
Lin H, Gao F, Zhang H et al (2022) Public key encryption with equality test supporting flexible designated authorization in cloud storage. IEEE Syst J 16(1):1460–1470
Susilo W, Guo FC, Zhao Z et al (2022) PKE-MET: Public-key encryption with multi-ciphertext equality test in cloud computing. IEEE Trans Cloud Comput 10(2):1476–1488
Zhao Z, Guo FC, Wu G et al (2022) Secure infectious diseases detection system with IoT-based e-health platforms. IEEE Internet Things J 9(22):22595–22607
Al-Zubaidie M, Zhang ZW, Zhang J (2019) RAMHU: A new robust lightweight scheme for mutual users authentication in healthcare applications. Secur Commun Networks 3263902(1–3263902):26
Murillo-Escobar MÁ, Quintana-Ibarra JA, Cruz-Hernández C et al (2023) Biosignal encryption algorithm based on Ushio chaotic map for e-health. Multim Tools Appl 82(15):23373–23399
Al-Zubaidie M (2023) Implication of lightweight and robust hash function to support key exchange in health sensor networks. Symmetry 15(1):152
Zhu HJ, Wang LC, Ahmad H, et al (2017) Pairingfree equality test over short ciphertexts. Int J Distributed Sens Networks 13(6) https://doi.org/10.1177/1550147717715605
Lin XJ, Qu HP, Zhang XS (2021) Public key encryption supporting equality test and flexible authorization without bilinear pairings. Comput Commun 170:190–199
Shen XY, Wang BC, Wang LC et al (2022) Group public key encryption supporting equality test without bilinear pairings. Inf Sci 605:202–224
Wu LB, Zhang YB, Choo KKR et al (2017) Efficient identity-based encryption scheme with equality test in smart city. IEEE Trans Sustain Comput 3(1):44–55
Tang Q (2012) Public key encryption schemes supporting equality test with authorization of different granularity. Int J Appl Cryptography 2(4):304–321
Zhao M, Ding Y, Tang SJ et al (2022) Public key encryption with authorized equality test on outsourced ciphertexts for cloud-assisted IoT in dual server model. Wirel Commun Mob Comput. https://doi.org/10.1155/2022/4462134
Wu T, Ma S, Mu Y et al (2017) ID-based encryption with equality test against insider attack. In Proc Austral Conf Inf Secur Privacy 10342:168–183
Ling YH, Ma S, Huang Q et al (2019) Group ID-based encryption with equality test. In Proc Austral Conf Inf Secur Privacy 11547:39–57
Shor PW (1999) Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer. SIAM Rev 41(2):303–332
Duong DH, Fukushima K, Kiyomoto S et al (2019) A lattice-based public key encryption with equality test in standard model. In Proc Austral Conf Inf Secur Privacy 11547:138–155
Duong DH, Le HQ, Roy PS et al (2019) Lattice-based IBE with equality test in standard model. In Proc Int Conf ProvSec 11821:19–40
Roy PS, Duong DH, Susilo W et al (2022) Lattice-based public-key encryption with equality test supporting flexible authorization in standard model. Theor Comput Sci 929:124–139
Duong DH, Roy PS, Susilo W et al (2022) Chosen-ciphertext lattice-based public key encryption with equality test in standard model. Theor Comput Sci 905:31–53
Shen XY, Wang LC, Zhu HJ et al (2020) A multivariate public key encryption scheme with equality test. IEEE Access 8:75463–75472
Zhou ZJ, Liao YJ, Zhang GL et al (2022) A fully secure identity based encryption scheme with equality test in the standard model in cloud computing. Int J Netw Secur 24(5):841–854
Deng XT, Qian HF (2022) Group public key encryption with equality test under standard model. Secur Commun Networks. https://doi.org/10.1155/2022/4605685
Wang YH, Cui YZ, Huang Q et al (2020) Attribute-based equality test over encrypted data without random oracles. IEEE Access 8:32891–32903
Cui YZ, Huang Q, Huang JY et al (2019) Ciphertext-policy attribute-based encrypted data equality test and classification. Comput J 62(8):1166–1177
Wang Q, Peng L, Xiong H et al (2017) Ciphertext-policy attribute-based encryption with delegated equality test in cloud computing. IEEE Access 6:760–771
Wang YJ, Pang HH, Deng RH et al (2020) Secure server-aided data sharing clique with attestation. Inf Sci 522:80–98
Li WC, Xia CH, Wang C et al (2022) Secure and temporary access delegation with equality test for cloud-assisted IoV. IEEE Trans Intell Transp Syst 23(11):20187–20201
Blaze M, Bleumer G, Strauss M (1998) Divertible protocols and atomic proxy cryptography. In Proc Int Conf Theory Appl Cryptograph Techn 1403:127–144
Akinyele JA, Garman C, Miers I et al (2013) Charm: a framework for rapidly prototyping cryptosystems. J Cryptogr Eng 3(2):111–128
Acknowledgements
This work is supported by National Key R &D Program of China (Grant Nos. 2021YFB3101300, 2021YFB3101302, 2021YFB3101305), and Major Programs of the National Social Science Foundation of China(Grant No. 22 &ZD147).
Author information
Authors and Affiliations
Corresponding authors
Ethics declarations
Conflicts of interest statement
The authors declared that they have no conflicts of interest in this work. We declare that we do not have any commercial or associative interest that represents a conflict of interest in connection with the work submitted.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Lin, H., Zhao, G., Song, S. et al. A new lightweight public key encryption with equality test for cloud storage. Multimed Tools Appl 83, 28947–28968 (2024). https://doi.org/10.1007/s11042-023-16540-1
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-023-16540-1