Skip to main content

Group ID-Based Encryption with Equality Test

  • Conference paper
  • First Online:
Information Security and Privacy (ACISP 2019)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 11547))

Included in the following conference series:

Abstract

In era of cloud computing, how to search on encrypted data has been studied extensively. ID-based encryption with equality test (IBEET) as a type of searchable encryption allows a tester (insider) to check whether two ciphertexts encrypted under different identities contain the same message. Due to its equality test functionality, IBEET has many interesting applications, such as personal health record systems. In this paper, we first introduce group mechanism into IBEET and propose a new primitive, namely group ID-based encryption with equality test (G-IBEET). By the group mechanism, G-IBEET supports group granularity authorization. That is, a group administrator, who is trusted by group users, would issue the insider a group trapdoor to specify that it can only compare on ciphertexts of the group users but cannot compare with ciphertexts of any users other than them. Moreover, the workload of generation and management of trapdoors can be greatly reduced due to the group granularity authorization. For the insider attack which exists in most IBEET schemes with the goal of recovering the message from a ciphertext by mounting an offline message recovery attack, G-IBEET provides a nice solution for IBEET to resist it by the group mechanism. We propose a G-IBEET scheme in bilinear pairings, prove its security in the random oracle model and show that the proposed scheme has a more efficient test algorithm.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 79.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 99.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Chen, R., Mu, Y., Yang, G., Guo, F., Wang, X.: A new general framework for secure public key encryption with keyword search. In: Foo, E., Stebila, D. (eds.) ACISP 2015. LNCS, vol. 9144, pp. 59–76. Springer, Cham (2015). https://doi.org/10.1007/978-3-319-19962-7_4

    Chapter  Google Scholar 

  2. Chen, R., Mu, Y., Yang, G., Guo, F., Wang, X.: Dual-server public-key encryption with keyword search for secure cloud storage. IEEE Transa. Inf. Forensics Secur. 11(4), 789–798 (2016)

    Google Scholar 

  3. Boneh, D., Di Crescenzo, G., Ostrovsky, R., Persiano, G.: Public key encryption with keyword search. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 506–522. Springer, Heidelberg (2004). https://doi.org/10.1007/978-3-540-24676-3_30

    Chapter  Google Scholar 

  4. Huang, K., Tso, R., Chen, Y.-C., Li, W., Sun, H.-M.: A new public key encryption with equality test. In: Au, M.H., Carminati, B., Kuo, C.-C.J. (eds.) NSS 2014. LNCS, vol. 8792, pp. 550–557. Springer, Cham (2014). https://doi.org/10.1007/978-3-319-11698-3_45

    Chapter  Google Scholar 

  5. Huang, K., Tso, R., Chen, Y.C., Rahman, S.M.M., Almogren, A., Alamri, A.: Pke-aet: public key encryption with authorized equality test. Comput. J. 58(10), 2686–2697 (2015)

    Article  Google Scholar 

  6. Huang, Q., Li, H.: An efficient public-key searchable encryption scheme secure against inside keyword guessing attacks. Inf. Sci. 403, 1–14 (2017)

    Article  Google Scholar 

  7. Lee, H.T., Ling, S., Seo, J.H., Wang, H.: Semi-generic construction of public key encryption and identity-based encryption with equality test. Inf. Sci. 373, 419–440 (2016)

    Article  Google Scholar 

  8. Lee, H.T., Ling, S., Seo, J.H., Wang, H., Youn, T.Y.: Public key encryption with equality test in the standard model. IACR Cryptology ePrint Archive 2016, 1182 (2016)

    Google Scholar 

  9. Li, H., Huang, Q., Ma, S., Shen, J., Susilo, W.: Authorized equality test on identity-based ciphertexts for secret data sharing via cloud storage. IEEE Access (Early Access) 7, 1 (2019)

    Article  Google Scholar 

  10. Lin, X.J., Qu, H., Zhang, X.: Public key encryption supporting equality test and flexible authorization without bilinear pairings. IACR Cryptology ePrint Archive 2016, 277 (2016)

    Google Scholar 

  11. Ling, Y., Ma, S., Huang, Q., Li, X.: A general two-server framework for ciphertext-checkable encryption against offline message recovery attack. In: Sun, X., Pan, Z., Bertino, E. (eds.) ICCCS 2018. LNCS, vol. 11065, pp. 370–382. Springer, Cham (2018). https://doi.org/10.1007/978-3-030-00012-7_34

    Chapter  Google Scholar 

  12. Ma, S.: Identity-based encryption with outsourced equality test in cloud computing. Inf. Sci. 328, 389–402 (2016)

    Article  Google Scholar 

  13. Ma, S.: Authorized equality test of encrypted data for secure cloud databases. In: 2018 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications/12th IEEE International Conference on Big Data Science and Engineering (TrustCom/BigDataSE), pp. 223–230 (2018)

    Google Scholar 

  14. Ma, S., Huang, Q., Zhang, M., Yang, B.: Efficient public key encryption with equality test supporting flexible authorization. IEEE Trans. Inf. Forensics Secur. 10(3), 458–470 (2015)

    Article  Google Scholar 

  15. Ma, S., Ling, Y.: A general two-server cryptosystem supporting complex queries. In: Kang, B.B.H., Kim, T. (eds.) WISA 2017. LNCS, vol. 10763, pp. 249–260. Springer, Cham (2018). https://doi.org/10.1007/978-3-319-93563-8_21

    Chapter  Google Scholar 

  16. Ma, S., Zhang, M., Huang, Q., Yang, B.: Public key encryption with delegated equality test in a multi-user setting. Comput. J. 58(4), 986–1002 (2015)

    Article  Google Scholar 

  17. Qu, H., Yan, Z., Lin, X.J., Zhang, Q., Sun, L.: Certificateless public key encryption with equality test. Inf. Sci. 462, 76–92 (2018)

    Article  MathSciNet  Google Scholar 

  18. Tang, Q.: Towards public key encryption scheme supporting equality test with fine-grained authorization. In: Parampalli, U., Hawkes, P. (eds.) ACISP 2011. LNCS, vol. 6812, pp. 389–406. Springer, Heidelberg (2011). https://doi.org/10.1007/978-3-642-22497-3_25

    Chapter  Google Scholar 

  19. Tang, Q.: Public key encryption schemes supporting equality test with authorisation of different granularity. Int. J. Appl. Crypt. 2(4), 304–321 (2012)

    Article  MathSciNet  Google Scholar 

  20. Tang, Q.: Public key encryption supporting plaintext equality test and user-specified authorization. Secur. Commun. Netw. 5(12), 1351–1362 (2012)

    Article  Google Scholar 

  21. Wang, C.H., Tai-Yuan, T.U.: Keyword search encryption scheme resistant against keyword-guessing attack by the untrusted server. J. Shanghai Jiaotong Univ. (Sci.) 19(4), 440–442 (2014)

    Article  Google Scholar 

  22. Wang, Y., Pang, H.: Probabilistic public key encryption for controlled equijoin in relational databases. Comput. J. 60(4), 600–612 (2017)

    MathSciNet  Google Scholar 

  23. Wu, L., Zhang, Y., Choo, K.K.R., He, D.: Efficient and secure identity-based encryption scheme with equality test in cloud computing. Future Gener. Comput. Syst. 73, 22–31 (2017)

    Article  Google Scholar 

  24. Wu, L., Zhang, Y., He, D.: Dual server identity-based encryption with equality test for cloud computing. J. Comput. Res. Dev. 54(10), 2232–2243 (2017)

    Google Scholar 

  25. Wu, T., Ma, S., Mu, Y., Zeng, S.: ID-based encryption with equality test against insider attack. In: Pieprzyk, J., Suriadi, S. (eds.) ACISP 2017. LNCS, vol. 10342, pp. 168–183. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-60055-0_9

    Chapter  Google Scholar 

  26. Yacobi, Y.: A note on the bilinear Diffie-Hellman assumption. IACR Cryptology ePrint Archive 2002, 113 (2002)

    Google Scholar 

  27. Yang, G., Tan, C.H., Huang, Q., Wong, D.S.: Probabilistic public key encryption with equality test. In: Pieprzyk, J. (ed.) CT-RSA 2010. LNCS, vol. 5985, pp. 119–131. Springer, Heidelberg (2010). https://doi.org/10.1007/978-3-642-11925-5_9

    Chapter  Google Scholar 

  28. Zhang, K., Chen, J., Lee, H.T., Qian, H., Wang, H.: Efficient public key encryption with equality test in the standard model. Theor. Comput. Sci. 755, 65–80 (2019). https://doi.org/10.1016/j.tcs.2018.06.048

    Article  MathSciNet  MATH  Google Scholar 

Download references

Acknowledgement

This work is supported by National Natural Science Foundation of China (No. 61872409, 61872152), Pearl River Nova Program of Guangzhou (No. 201610010037), Guangdong Natural Science Funds for Distinguished Young Scholar (No. 2014A030306021) and Guangdong Program for Special Support of Topnotch Young Professionals (No. 2015TQ01X796).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Sha Ma .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Ling, Y., Ma, S., Huang, Q., Xiang, R., Li, X. (2019). Group ID-Based Encryption with Equality Test. In: Jang-Jaccard, J., Guo, F. (eds) Information Security and Privacy. ACISP 2019. Lecture Notes in Computer Science(), vol 11547. Springer, Cham. https://doi.org/10.1007/978-3-030-21548-4_3

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-21548-4_3

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-21547-7

  • Online ISBN: 978-3-030-21548-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics