ID-Based Encryption with Equality Test Against Insider Attack

Testing if two ciphertexts contain the same plaintext is an interesting cryptographic primitive. It is usually referred to as equality test of encrypted data or equality test. One of attractive applications of equality test is for encrypted database systems, where the database server hosts the encrypted databases and users can query if the plaintext embedded in a ciphertext on a database is equal to that in the queried ciphertext without decryption. Although it is not hard to achieve with the pairing-based cryptography, the security against the insider attack (by the database server) is a challenging task. In this paper, we propose a novel equality test scheme aiming to solve the problem. Our scheme adopts the identity-based cryptography. We prove the security of our scheme in the random oracle model.

[1]  Qiang Tang,et al.  Public key encryption schemes supporting equality test with authorisation of different granularity , 2012, Int. J. Appl. Cryptogr..

[2]  Mingwu Zhang,et al.  Public Key Encryption with Delegated Equality Test in a Multi-User Setting , 2015, Comput. J..

[3]  Daniel A. Mayer,et al.  Verifiable private equality test: enabling unbiased 2-party reconciliation on ordered sets in the malicious model , 2012, ASIACCS '12.

[4]  Rafail Ostrovsky,et al.  Public Key Encryption with Keyword Search , 2004, EUROCRYPT.

[5]  Mingwu Zhang,et al.  Efficient Public Key Encryption With Equality Test Supporting Flexible Authorization , 2015, IEEE Transactions on Information Forensics and Security.

[6]  Peng Jiang,et al.  Online/Offline Ciphertext Retrieval on Resource Constrained Devices , 2016, Computer/law journal.

[7]  Kaibin Huang,et al.  PKE-AET: Public Key Encryption with Authorized Equality Test , 2015, Comput. J..

[8]  Dan Boneh,et al.  Short Signatures Without Random Oracles , 2004, EUROCRYPT.

[9]  Angelo De Caro,et al.  jPBC: Java pairing based cryptography , 2011, 2011 IEEE Symposium on Computers and Communications (ISCC).

[10]  Fuchun Guo,et al.  Dual-Server Public-Key Encryption With Keyword Search for Secure Cloud Storage , 2016, IEEE Transactions on Information Forensics and Security.

[11]  Sha Ma,et al.  Identity-based encryption with outsourced equality test in cloud computing , 2016, Inf. Sci..

[12]  Guomin Yang,et al.  Probabilistic Public Key Encryption with Equality Test , 2010, CT-RSA.

[13]  Qiang Tang,et al.  Public key encryption supporting plaintext equality test and user-specified authorization , 2012, Secur. Commun. Networks.

[14]  Kenneth G. Paterson,et al.  Pairings for Cryptographers , 2008, IACR Cryptol. ePrint Arch..