Cargando…
Traceable Scheme of Public Key Encryption with Equality Test
Public key encryption supporting equality test (PKEwET) schemes, because of their special function, have good applications in many fields, such as in cloud computing services, blockchain, and the Internet of Things. The original PKEwET has no authorization function. Subsequently, many PKEwET schemes...
Autores principales: | , , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
MDPI
2022
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8947313/ https://www.ncbi.nlm.nih.gov/pubmed/35327820 http://dx.doi.org/10.3390/e24030309 |
_version_ | 1784674409948119040 |
---|---|
author | Zhu, Huijun Xue, Qingji Li, Tianfeng Xie, Dong |
author_facet | Zhu, Huijun Xue, Qingji Li, Tianfeng Xie, Dong |
author_sort | Zhu, Huijun |
collection | PubMed |
description | Public key encryption supporting equality test (PKEwET) schemes, because of their special function, have good applications in many fields, such as in cloud computing services, blockchain, and the Internet of Things. The original PKEwET has no authorization function. Subsequently, many PKEwET schemes have been proposed with the ability to perform authorization against various application scenarios. However, these schemes are incapable of traceability to the ciphertexts. In this paper, the ability of tracing to the ciphertexts is introduced into a PKEwET scheme. For the ciphertexts, the presented scheme supports not only the equality test, but also has the function of traceability. Meanwhile, the security of the proposed scheme is revealed by a game between an adversary and a simulator, and it achieves a desirable level of security. Depending on the attacker’s privileges, it can resist OW-CCA security against an adversary with a trapdoor, and can resist IND-CCA security against an adversary without a trapdoor. Finally, the performance of the presented scheme is discussed. |
format | Online Article Text |
id | pubmed-8947313 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2022 |
publisher | MDPI |
record_format | MEDLINE/PubMed |
spelling | pubmed-89473132022-03-25 Traceable Scheme of Public Key Encryption with Equality Test Zhu, Huijun Xue, Qingji Li, Tianfeng Xie, Dong Entropy (Basel) Article Public key encryption supporting equality test (PKEwET) schemes, because of their special function, have good applications in many fields, such as in cloud computing services, blockchain, and the Internet of Things. The original PKEwET has no authorization function. Subsequently, many PKEwET schemes have been proposed with the ability to perform authorization against various application scenarios. However, these schemes are incapable of traceability to the ciphertexts. In this paper, the ability of tracing to the ciphertexts is introduced into a PKEwET scheme. For the ciphertexts, the presented scheme supports not only the equality test, but also has the function of traceability. Meanwhile, the security of the proposed scheme is revealed by a game between an adversary and a simulator, and it achieves a desirable level of security. Depending on the attacker’s privileges, it can resist OW-CCA security against an adversary with a trapdoor, and can resist IND-CCA security against an adversary without a trapdoor. Finally, the performance of the presented scheme is discussed. MDPI 2022-02-22 /pmc/articles/PMC8947313/ /pubmed/35327820 http://dx.doi.org/10.3390/e24030309 Text en © 2022 by the authors. https://creativecommons.org/licenses/by/4.0/Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). |
spellingShingle | Article Zhu, Huijun Xue, Qingji Li, Tianfeng Xie, Dong Traceable Scheme of Public Key Encryption with Equality Test |
title | Traceable Scheme of Public Key Encryption with Equality Test |
title_full | Traceable Scheme of Public Key Encryption with Equality Test |
title_fullStr | Traceable Scheme of Public Key Encryption with Equality Test |
title_full_unstemmed | Traceable Scheme of Public Key Encryption with Equality Test |
title_short | Traceable Scheme of Public Key Encryption with Equality Test |
title_sort | traceable scheme of public key encryption with equality test |
topic | Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8947313/ https://www.ncbi.nlm.nih.gov/pubmed/35327820 http://dx.doi.org/10.3390/e24030309 |
work_keys_str_mv | AT zhuhuijun traceableschemeofpublickeyencryptionwithequalitytest AT xueqingji traceableschemeofpublickeyencryptionwithequalitytest AT litianfeng traceableschemeofpublickeyencryptionwithequalitytest AT xiedong traceableschemeofpublickeyencryptionwithequalitytest |