4.7 Article

Efficient and secure identity-based encryption scheme with equality test in cloud computing

Publisher

ELSEVIER
DOI: 10.1016/j.future.2017.03.007

Keywords

Identity-based encryption; Equality test; Searchable encryption; Cloud computing; Provable security

Funding

  1. National Natural Science Foundation of China [61472287, 61501333, 61572379]
  2. Natural Science Foundation of Hubei Province of China [2015CFA068, 2015CFB257]
  3. National High-tech R&D Program of China (863 Program) [2015AA016004]
  4. open fund of Guangxi Key Laboratory of Cryptography and Information Security [GCIS201608]

Ask authors/readers for more resources

Efficient searching on encrypted data outsourced to the cloud remains a research challenge. Identity based encryption with equality test (IBEET) scheme has recently been identified as a viable solution, in which users can delegate a trapdoor to the server and the server then searches on user outsourced encrypted data to determine whether two different ciphertexts are encryptions of the same plaintext. Such schemes are, unfortunately, inefficient particularly for deployment on mobile devices (with limited power/battery life and computing capacity). In this paper, we propose an efficient IBEET scheme with bilinear pairing, which reduces the need for time-consuming HashToPoint ftinction. We then prove the security of our scheme for one-way secure against chosen identity and chosen ciphertext attacks (OW-ID-CCA) in the random oracle model (ROM). The performance evaluation of our scheme demonstrates that in comparison to the scheme of Ma (2016), our scheme achieves a reduction of 36.7% and 39.24% in computation cost during the encryption phase and test phase, respectively, and that our scheme is suitable for (mobile) cloud deployment. (C) 2017 Elsevier B.V. All rights reserved.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.7
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available