4.4 Article

Efficient Identity-Based Encryption Scheme with Equality Test in Smart City

Journal

IEEE TRANSACTIONS ON SUSTAINABLE COMPUTING
Volume 3, Issue 1, Pages 44-55

Publisher

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/TSUSC.2017.2734110

Keywords

Smart grid; equality test; identity-based; encryption scheme; cloud to edge

Funding

  1. National Natural Science Foundation of China [61472287, 61373169, 61501333, 61572379]
  2. Natural Science Foundation of Hubei Province of China [2015CFA068, 2015CFB257]
  3. National High-tech R&D Program of China (863 Program) [2015AA016004]
  4. Guangxi Key Laboratory of Cryptography and Information Security [GCIS201608]
  5. Fundamental Research Funds for the Central Universities

Ask authors/readers for more resources

To support a sustainable development of smart city, smart grid is an indispensable part. Sensor technology in smart gird enables interactive real-time data transmission between cloud and the edge of the network. There are a number of research challenges in the design of smart grids. One of these research challenges is balancing customer privacy and the cloud-based power system's function optimization. Identity-based encryption with equality test (IBEET) scheme has recently been identified as a viable solution, in which customers can delegate a trapdoor to the power system control server and the server then searches on the encrypted data to determine whether two different ciphertexts are encryptions of the same plaintext. Unfortunately, existing schemes are inefficient and the trapdoor could be used to perform equality test on any message; thus, leakage of privacy. In this paper, we propose an efficient IBEET scheme with bilinear pairing, which reduces the need for time-consuming HashToPoint function and each trapdoor could only be used to perform the equality test on a particular keyword. We then prove the security of our scheme for one-way chosen-ciphertext security against a chosen identity (OW-ID-CCA) attack in the random oracle model (ROM). The performance evaluation of our scheme demonstrates that in comparison to the scheme of Ma (2016), our scheme achieves a reduction of 36.7 and 39.24 percent in computation costs during the encryption phase and test phase, respectively.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.4
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available