Skip to main content
Erschienen in: The Journal of Supercomputing 13/2023

13.04.2023

Constructing conditional PKEET with verification mechanism for data privacy protection in intelligent systems

verfasst von: Hanshu Hong, Zhixin Sun

Erschienen in: The Journal of Supercomputing | Ausgabe 13/2023

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Intelligent systems provide a wide range of smart services such as data analytics, mining and recommendation. Since the efficacy of intelligent algorithms are assured by the large volume of data which contain user-related sensitive information, how to make the best use of these data without leaking the private information becomes a primary challenge for intelligent systems. Ciphertext testing allows a system to test if the ciphertexts encrypted by different public keys correspond to the same plaintext and are suitable for providing privacy preserving calculation in intelligent systems, but conventional schemes lack the verification mechanism. To better solve the problem, in this paper, we present a new paradigm named conditional public key encryption with equality test (CPKEET). This paradigm allows a user to conduct ciphertext testing only if he holds the valid credentials generated by a designated issuer server. This property deals with the verification mechanism for data privacy protection in intelligent algorithms. We give the generic construction of this paradigm and instantiate a CPKEET scheme by proposing a round optimal attribute-based encryption with conditional equality test (RO-ABE-CET). We define the concrete algorithms and a detailed evaluation of RO-ABE-CET. The high security level and along with its superior efficacy makes it appropriate to be applied for data privacy protection in intelligent systems.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Jin L, Qian W, Cong W et al (2009) Enabling efficient fuzzy keyword search over encrypted data in cloud computing. Comput Sci Inf Syst Jin L, Qian W, Cong W et al (2009) Enabling efficient fuzzy keyword search over encrypted data in cloud computing. Comput Sci Inf Syst
2.
Zurück zum Zitat Jin L, Ren K, Bo Z et al (2009) Privacy-aware attribute-based encryption with user accountability. In: International Conference on Information Security. Springer, Berlin, Heidelberg Jin L, Ren K, Bo Z et al (2009) Privacy-aware attribute-based encryption with user accountability. In: International Conference on Information Security. Springer, Berlin, Heidelberg
3.
Zurück zum Zitat Hong H, Sun Z (2021) A flexible attribute based data access management scheme for sensor-cloud system. J Syst Archit 119:102234CrossRef Hong H, Sun Z (2021) A flexible attribute based data access management scheme for sensor-cloud system. J Syst Archit 119:102234CrossRef
4.
Zurück zum Zitat Hong H, Sun Z (2022) TS-ABOS-CMS: time-bounded secure attribute-based online/offline signature with constant message size for IoT systems. J Syst Archit 123:102388CrossRef Hong H, Sun Z (2022) TS-ABOS-CMS: time-bounded secure attribute-based online/offline signature with constant message size for IoT systems. J Syst Archit 123:102388CrossRef
6.
Zurück zum Zitat Duong DH, Fukushima K, Kiyomoto S, Roy PS, Susilo W (2019) A lattice-based public key encryption with equality test in standard model. In: Jang-Jaccard J, Guo F (eds) Information Security and Privacy. ACISP 2019. Lecture Notes in Computer Science, vol 11547. Springer, Cham. https://doi.org/10.1007/978-3-030-21548-4_8 Duong DH, Fukushima K, Kiyomoto S, Roy PS, Susilo W (2019) A lattice-based public key encryption with equality test in standard model. In: Jang-Jaccard J, Guo F (eds) Information Security and Privacy. ACISP 2019. Lecture Notes in Computer Science, vol 11547. Springer, Cham. https://​doi.​org/​10.​1007/​978-3-030-21548-4_​8
10.
Zurück zum Zitat Cui Y, Huang Q, Huang J, Li H, Yang G (2019) Outsourced ciphertext-policy attribute-based encryption with equality test. In: Guo F, Huang X, Yung M (eds) Information Security and Cryptology. Inscrypt 2018. Lecture Notes in Computer Science, vol 11449. Springer, Cham. https://doi.org/10.1007/978-3-030-14234-6_24 Cui Y, Huang Q, Huang J, Li H, Yang G (2019) Outsourced ciphertext-policy attribute-based encryption with equality test. In: Guo F, Huang X, Yung M (eds) Information Security and Cryptology. Inscrypt 2018. Lecture Notes in Computer Science, vol 11449. Springer, Cham. https://​doi.​org/​10.​1007/​978-3-030-14234-6_​24
18.
Zurück zum Zitat Cramer R, Shoup V (2002) Universal hash proofs and a paradigm for adaptive chosen ciphertext secure public-key encryption. In: International Conference on the Theory & Applications of Cryptographic Techniques: Advances in Cryptology. Springer, Berlin Cramer R, Shoup V (2002) Universal hash proofs and a paradigm for adaptive chosen ciphertext secure public-key encryption. In: International Conference on the Theory & Applications of Cryptographic Techniques: Advances in Cryptology. Springer, Berlin
19.
Zurück zum Zitat Wang Z, Hu H, Zheng M, Nan J (2019) Symmetric lattice-based PAKE from approximate smooth projective hash function and reconciliation mechanism. In: Shen B, Wang B, Han J, Yu Y (eds) Frontiers in Cyber Security. FCS 2019. Communications in Computer and Information Science, vol 1105. Springer, Singapore. https://doi.org/10.1007/978-981-15-0818-9_7 Wang Z, Hu H, Zheng M, Nan J (2019) Symmetric lattice-based PAKE from approximate smooth projective hash function and reconciliation mechanism. In: Shen B, Wang B, Han J, Yu Y (eds) Frontiers in Cyber Security. FCS 2019. Communications in Computer and Information Science, vol 1105. Springer, Singapore. https://​doi.​org/​10.​1007/​978-981-15-0818-9_​7
20.
Zurück zum Zitat Li N, Du W, Boneh D (2003) Oblivious signature-based envelope. In: 22nd ACM Symposium Annual on Principles of Distributed Computing. ACM Press, pp 182–189 Li N, Du W, Boneh D (2003) Oblivious signature-based envelope. In: 22nd ACM Symposium Annual on Principles of Distributed Computing. ACM Press, pp 182–189
21.
23.
24.
Zurück zum Zitat Wang Y, Cui Y, Huang Q et al (2020) Attribute-Based equality test over encrypted data without random Oracles. IEEE Access 8:32891–32903CrossRef Wang Y, Cui Y, Huang Q et al (2020) Attribute-Based equality test over encrypted data without random Oracles. IEEE Access 8:32891–32903CrossRef
25.
Zurück zum Zitat Zhu H, Wang L, Ahmad H, Niu X (2017) Key-policy attribute-based encryption with equality test in cloud computing. IEEE Access 5:20428–20439CrossRef Zhu H, Wang L, Ahmad H, Niu X (2017) Key-policy attribute-based encryption with equality test in cloud computing. IEEE Access 5:20428–20439CrossRef
26.
Zurück zum Zitat Wang Q, Peng L, Xiong H, Sun J, Qin Z (2018) Ciphertext-policy attribute-based encryption with delegated equality test in cloud computing. IEEE Access 6:760–771CrossRef Wang Q, Peng L, Xiong H, Sun J, Qin Z (2018) Ciphertext-policy attribute-based encryption with delegated equality test in cloud computing. IEEE Access 6:760–771CrossRef
27.
Zurück zum Zitat Cui Y, Huang Q, Huang J, Li H, Yang G (2019) Ciphertext-policy attribute-based encrypted data equality test and classification. Comput J 8:8MathSciNet Cui Y, Huang Q, Huang J, Li H, Yang G (2019) Ciphertext-policy attribute-based encrypted data equality test and classification. Comput J 8:8MathSciNet
Metadaten
Titel
Constructing conditional PKEET with verification mechanism for data privacy protection in intelligent systems
verfasst von
Hanshu Hong
Zhixin Sun
Publikationsdatum
13.04.2023
Verlag
Springer US
Erschienen in
The Journal of Supercomputing / Ausgabe 13/2023
Print ISSN: 0920-8542
Elektronische ISSN: 1573-0484
DOI
https://doi.org/10.1007/s11227-023-05253-9

Weitere Artikel der Ausgabe 13/2023

The Journal of Supercomputing 13/2023 Zur Ausgabe

Premium Partner