Abstract
Public key encryption supporting equality test (PKEwET) schemes, because of their special function, have good applications in many fields, such as in cloud computing services, blockchain, and the Internet of Things. The original PKEwET has no authorization function. Subsequently, many PKEwET schemes have been proposed with the ability to perform authorization against various application scenarios. However, these schemes are incapable of traceability to the ciphertexts. In this paper, the ability of tracing to the ciphertexts is introduced into a PKEwET scheme. For the ciphertexts, the presented scheme supports not only the equality test, but also has the function of traceability. Meanwhile, the security of the proposed scheme is revealed by a game between an adversary and a simulator, and it achieves a desirable level of security. Depending on the attacker’s privileges, it can resist OW-CCA security against an adversary with a trapdoor, and can resist IND-CCA security against an adversary without a trapdoor. Finally, the performance of the presented scheme is discussed.
Highlights
With the continuous development of the Internet of Things (IoT), the security of data has gotten more attention
A new cryptographic primitive approach emerged as the times required, namely the public key encryption supporting equality test (PKEwET) [7]
In 2016, Lee et al improved the scheme of Ma, and proposed a new scheme that achieved IND-CCA security [20], and presented an equality test scheme based on the standard model for the first time [21]
Summary
With the continuous development of the Internet of Things (IoT), the security of data has gotten more attention. In order to ensure the security of data, data are stored on a server by encryption. It is inconvenient for effective application when the data are encrypted, making it impossible to search within encrypted data. The aim of SE is to produce a tag related to ciphertext, and to classify the ciphertexts. Since this primitive approach was proposed, many cryptographers have studied it extensively and deeply [2,3,4,5,6]. A new cryptographic primitive approach emerged as the times required, namely the public key encryption supporting equality test (PKEwET) [7].
Published Version (Free)
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have