Advertisement

Fine-Grained Attribute-Based Encryption Scheme Supporting Equality Test

  • Nabeil Eltayieb
  • Rashad Elhabob
  • Alzubair Hassan
  • Fagen Li
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 11337)

Abstract

The data of user should be protected against untrusted cloud server. A simple way is to use cryptographic methods. Attribute-based encryption (ABE) plays a vital role in securing many applications, particularly in cloud computing. In this paper, we propose a scheme called fine-grained attribute-based encryption supporting equality test (FG-ABEET). The proposed scheme grants the cloud server to perform if two ciphertexts are encryptions of the same message encrypted with the same access policy or different access policy. Moreover, the cloud server can perform the equality test operation without knowing anything about the message encrypted under either access policy. The FG-ABEET scheme is proved to be secure under Decisional Bilinear Diffe-Hellman (DBDH) assumption. In addition, the performance comparisons reveal that the proposed FG-ABEET scheme is efficient and practical.

Keywords

Cloud server Attribute-based encryption Equality test Decisional Bilinear Diffe-Hellman 

Notes

Acknowledgements

We would like to thank the anonymous reviewers for their valuable comments and suggestions. This work is supported by the National Natural Science Foundation of China (Grant No. 61872058) and Fundamental Research Funds for the Central Universities (Grant No. ZYGX2016J081)

References

  1. 1.
    Abdalla, M., Bellare, M., Catalano, D., Kiltz, E., Kohno, T., Lange, T., Malone-Lee, J., Neven, G., Paillier, P., Shi, H.: Searchable encryption revisited: consistency properties, relation to anonymous ibe, and extensions. J. Cryptol. 21, 350–391 (2005)MathSciNetCrossRefGoogle Scholar
  2. 2.
    Benaloh, J., Leichter, J.: Generalized secret sharing and monotone functions. In: Goldwasser, S. (ed.) CRYPTO 1988. LNCS, vol. 403, pp. 27–35. Springer, New York (1990).  https://doi.org/10.1007/0-387-34799-2_3CrossRefGoogle Scholar
  3. 3.
    Bethencourt, J., Sahai, A., Waters, B.: Ciphertext-policy attribute-based encryption. In: 2007 IEEE Symposium on Security and Privacy (SP 2007), pp. 321–334 (2007)Google Scholar
  4. 4.
    Boneh, D., Di Crescenzo, G., Ostrovsky, R., Persiano, G.: Public key encryption with keyword search. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 506–522. Springer, Heidelberg (2004).  https://doi.org/10.1007/978-3-540-24676-3_30CrossRefGoogle Scholar
  5. 5.
    Cheung, L., Newport, C.: Provably secure ciphertext policy ABE. In: 14th ACM Conference on Computer and Communications Security (CCS 2007), pp. 456–465 (2007)Google Scholar
  6. 6.
    Goyal, V., Pandey, O., Sahai, A., Waters, B.: Attribute-based encryption for fine-grained access control of encrypted data. In: Proceedings of the 13th ACM Conference on Computer and Communications Security, pp. 89–98. ACM (2006)Google Scholar
  7. 7.
    Li, H., Liu, D., Dai, Y., Luan, T.H., Shen, X.S.: Enabling efficient multi-keyword ranked search over encrypted mobile cloud data through blind storage. IEEE Trans. Emerg. Top. Comput. 3(1), 127–138 (2015)CrossRefGoogle Scholar
  8. 8.
    Li, J., Chen, X., Chow, S.S., Huang, Q., Wong, D.S., Liu, Z.: Multi-authority fine-grained access control with accountability and its application in cloud. J. Netw. Comput. Appl. 112(C), 89–96 (2018)CrossRefGoogle Scholar
  9. 9.
    Li, J., Li, J., Chen, X., Jia, C., Wong, D.S.: Secure outsourced attribute-based encryption. IACR Cryptology ePrint Archive, p, 635 (2012)Google Scholar
  10. 10.
    Liang, K., Susilo, W.: Searchable attribute-based mechanism with efficient data sharing for secure cloud storage. IEEE Trans. Inf. Forensics Secur. 10(9), 1981–1992 (2015)CrossRefGoogle Scholar
  11. 11.
    Liao, Y., Chen, H., Li, F., Jiang, S., Zhou, S., Mohammed, R.: Insecurity of a key-policy attribute based encryption scheme with equality test. IEEE Access 6, 10189–10196 (2018)CrossRefGoogle Scholar
  12. 12.
    Liu, Z., Luo, J., Xu, L.: A fine-grained attribute-based authentication for sensitive data stored in cloud computing. Int. J. Grid Util. Comput. 7(4), 237–244 (2016)CrossRefGoogle Scholar
  13. 13.
    Ma, S.: Identity-based encryption with outsourced equality test in cloud computing. Inf. Sci. 328, 389–402 (2016)CrossRefGoogle Scholar
  14. 14.
    Phuong, T.V.X., Yang, G., Susilo, W.: Poster: efficient ciphertext policy attribute based encryption under decisional linear assumption. In: Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security (CCS 2014), pp. 1490–1492 (2014)Google Scholar
  15. 15.
    Sahai, A., Waters, B.: Fuzzy identity-based encryption. In: Proceedings of the 24th Annual International Conference on Theory and Applications of Cryptographic Techniques, EUROCRYPT 2005, pp. 457–473 (2005)Google Scholar
  16. 16.
    Sebé, F., Domingo-Ferrer, J., Martinez-Balleste, A., Deswarte, Y., Quisquater, J.J.: Efficient remote data possession checking in critical information infrastructures. IEEE Trans. Knowl. Data Eng. 20(8), 1034–1038 (2008)CrossRefGoogle Scholar
  17. 17.
    Shah, M.A., Swaminathan, R., Baker, M.: Privacy-preserving audit and extraction of digital contents. IACR Cryptology ePrint Archive, p. 186 (2008)Google Scholar
  18. 18.
    Song, D.X., Wagner, D., Perrig, A.: Practical techniques for searches on encrypted data. In: 2000 IEEE Symposium on Security and Privacy, S&P 2000, Proceedings, pp. 44–55 (2000)Google Scholar
  19. 19.
    Tang, Q.: Towards public key encryption scheme supporting equality test with fine-grained authorization. In: Proceedings of the 16th Australasian Conference on Information Security and Privacy, (ACISP 2011), pp. 389–406 (2011)CrossRefGoogle Scholar
  20. 20.
    Tang, Q.: Public key encryption supporting plaintext equality test and user-specified authorization. Secur. Commun. Netw. 5(12), 1351–1362 (2012)CrossRefGoogle Scholar
  21. 21.
    Wang, Q., Peng, L., Xiong, H., Sun, J., Qin, Z.: Ciphertext-policy attribute-based encryption with delegated equality test in cloud computing. IEEE Access PP, 1 (2017)CrossRefGoogle Scholar
  22. 22.
    Wu, L., Zhang, Y., Choo, K.K.R., He, D.: Efficient and secure identity-based encryption scheme with equality test in cloud computing. Futur. Gener. Comput. Syst. 73(C), 22–31 (2017)CrossRefGoogle Scholar
  23. 23.
    Yang, G., Tan, C.H., Huang, Q., Wong, D.S.: Probabilistic public key encryption with equality test. In: Pieprzyk, J. (ed.) CT-RSA 2010. LNCS, vol. 5985, pp. 119–131. Springer, Heidelberg (2010).  https://doi.org/10.1007/978-3-642-11925-5_9CrossRefGoogle Scholar
  24. 24.
    Zhang, R., Ma, H., Lu, Y.: Fine-grained access control system based on fully outsourced attribute-based encryption. J. Syst. Softw. 125, 344–353 (2017)CrossRefGoogle Scholar
  25. 25.
    Zheng, Q., Xu, S., Ateniese, G.: Vabks: Verifiable attribute-based keyword search over outsourced encrypted data. In: IEEE International Conference on Computer (IEEE INFOCOM 2014), pp. 522-530 (2014)Google Scholar
  26. 26.
    Zhu, H., Wang, L., Ahmad, H., Niu, X.: Key-policy attribute-based encryption with equality test in cloud computing. IEEE Access 5, 20428–20439 (2017)CrossRefGoogle Scholar
  27. 27.
    Zhu, S., Yang, X.: Protecting data in cloud environment with attribute-based encryption. Int. J. Grid Util. Comput. 6(2), 91–97 (2015)CrossRefGoogle Scholar
  28. 28.
    Lynn, B.: The pairing-based cryptography library benchmarks. http://crypto.stanford.edu/pbc/times.html

Copyright information

© Springer Nature Switzerland AG 2018

Authors and Affiliations

  • Nabeil Eltayieb
    • 1
  • Rashad Elhabob
    • 2
  • Alzubair Hassan
    • 1
  • Fagen Li
    • 1
  1. 1.Center for Cyber Security, School of Computer Science and EngineeringUniversity of Electronic Science and Technology of ChinaChengduChina
  2. 2.School of Information and Software EngineeringUniversity of Electronic Science and Technology of ChinaChengduChina

Personalised recommendations