Skip to main content
Top

2018 | OriginalPaper | Chapter

Fine-Grained Attribute-Based Encryption Scheme Supporting Equality Test

Authors : Nabeil Eltayieb, Rashad Elhabob, Alzubair Hassan, Fagen Li

Published in: Algorithms and Architectures for Parallel Processing

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

The data of user should be protected against untrusted cloud server. A simple way is to use cryptographic methods. Attribute-based encryption (ABE) plays a vital role in securing many applications, particularly in cloud computing. In this paper, we propose a scheme called fine-grained attribute-based encryption supporting equality test (FG-ABEET). The proposed scheme grants the cloud server to perform if two ciphertexts are encryptions of the same message encrypted with the same access policy or different access policy. Moreover, the cloud server can perform the equality test operation without knowing anything about the message encrypted under either access policy. The FG-ABEET scheme is proved to be secure under Decisional Bilinear Diffe-Hellman (DBDH) assumption. In addition, the performance comparisons reveal that the proposed FG-ABEET scheme is efficient and practical.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Abdalla, M., Bellare, M., Catalano, D., Kiltz, E., Kohno, T., Lange, T., Malone-Lee, J., Neven, G., Paillier, P., Shi, H.: Searchable encryption revisited: consistency properties, relation to anonymous ibe, and extensions. J. Cryptol. 21, 350–391 (2005)MathSciNetCrossRef Abdalla, M., Bellare, M., Catalano, D., Kiltz, E., Kohno, T., Lange, T., Malone-Lee, J., Neven, G., Paillier, P., Shi, H.: Searchable encryption revisited: consistency properties, relation to anonymous ibe, and extensions. J. Cryptol. 21, 350–391 (2005)MathSciNetCrossRef
3.
go back to reference Bethencourt, J., Sahai, A., Waters, B.: Ciphertext-policy attribute-based encryption. In: 2007 IEEE Symposium on Security and Privacy (SP 2007), pp. 321–334 (2007) Bethencourt, J., Sahai, A., Waters, B.: Ciphertext-policy attribute-based encryption. In: 2007 IEEE Symposium on Security and Privacy (SP 2007), pp. 321–334 (2007)
5.
go back to reference Cheung, L., Newport, C.: Provably secure ciphertext policy ABE. In: 14th ACM Conference on Computer and Communications Security (CCS 2007), pp. 456–465 (2007) Cheung, L., Newport, C.: Provably secure ciphertext policy ABE. In: 14th ACM Conference on Computer and Communications Security (CCS 2007), pp. 456–465 (2007)
6.
go back to reference Goyal, V., Pandey, O., Sahai, A., Waters, B.: Attribute-based encryption for fine-grained access control of encrypted data. In: Proceedings of the 13th ACM Conference on Computer and Communications Security, pp. 89–98. ACM (2006) Goyal, V., Pandey, O., Sahai, A., Waters, B.: Attribute-based encryption for fine-grained access control of encrypted data. In: Proceedings of the 13th ACM Conference on Computer and Communications Security, pp. 89–98. ACM (2006)
7.
go back to reference Li, H., Liu, D., Dai, Y., Luan, T.H., Shen, X.S.: Enabling efficient multi-keyword ranked search over encrypted mobile cloud data through blind storage. IEEE Trans. Emerg. Top. Comput. 3(1), 127–138 (2015)CrossRef Li, H., Liu, D., Dai, Y., Luan, T.H., Shen, X.S.: Enabling efficient multi-keyword ranked search over encrypted mobile cloud data through blind storage. IEEE Trans. Emerg. Top. Comput. 3(1), 127–138 (2015)CrossRef
8.
go back to reference Li, J., Chen, X., Chow, S.S., Huang, Q., Wong, D.S., Liu, Z.: Multi-authority fine-grained access control with accountability and its application in cloud. J. Netw. Comput. Appl. 112(C), 89–96 (2018)CrossRef Li, J., Chen, X., Chow, S.S., Huang, Q., Wong, D.S., Liu, Z.: Multi-authority fine-grained access control with accountability and its application in cloud. J. Netw. Comput. Appl. 112(C), 89–96 (2018)CrossRef
9.
go back to reference Li, J., Li, J., Chen, X., Jia, C., Wong, D.S.: Secure outsourced attribute-based encryption. IACR Cryptology ePrint Archive, p, 635 (2012) Li, J., Li, J., Chen, X., Jia, C., Wong, D.S.: Secure outsourced attribute-based encryption. IACR Cryptology ePrint Archive, p, 635 (2012)
10.
go back to reference Liang, K., Susilo, W.: Searchable attribute-based mechanism with efficient data sharing for secure cloud storage. IEEE Trans. Inf. Forensics Secur. 10(9), 1981–1992 (2015)CrossRef Liang, K., Susilo, W.: Searchable attribute-based mechanism with efficient data sharing for secure cloud storage. IEEE Trans. Inf. Forensics Secur. 10(9), 1981–1992 (2015)CrossRef
11.
go back to reference Liao, Y., Chen, H., Li, F., Jiang, S., Zhou, S., Mohammed, R.: Insecurity of a key-policy attribute based encryption scheme with equality test. IEEE Access 6, 10189–10196 (2018)CrossRef Liao, Y., Chen, H., Li, F., Jiang, S., Zhou, S., Mohammed, R.: Insecurity of a key-policy attribute based encryption scheme with equality test. IEEE Access 6, 10189–10196 (2018)CrossRef
12.
go back to reference Liu, Z., Luo, J., Xu, L.: A fine-grained attribute-based authentication for sensitive data stored in cloud computing. Int. J. Grid Util. Comput. 7(4), 237–244 (2016)CrossRef Liu, Z., Luo, J., Xu, L.: A fine-grained attribute-based authentication for sensitive data stored in cloud computing. Int. J. Grid Util. Comput. 7(4), 237–244 (2016)CrossRef
13.
go back to reference Ma, S.: Identity-based encryption with outsourced equality test in cloud computing. Inf. Sci. 328, 389–402 (2016)CrossRef Ma, S.: Identity-based encryption with outsourced equality test in cloud computing. Inf. Sci. 328, 389–402 (2016)CrossRef
14.
go back to reference Phuong, T.V.X., Yang, G., Susilo, W.: Poster: efficient ciphertext policy attribute based encryption under decisional linear assumption. In: Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security (CCS 2014), pp. 1490–1492 (2014) Phuong, T.V.X., Yang, G., Susilo, W.: Poster: efficient ciphertext policy attribute based encryption under decisional linear assumption. In: Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security (CCS 2014), pp. 1490–1492 (2014)
15.
go back to reference Sahai, A., Waters, B.: Fuzzy identity-based encryption. In: Proceedings of the 24th Annual International Conference on Theory and Applications of Cryptographic Techniques, EUROCRYPT 2005, pp. 457–473 (2005) Sahai, A., Waters, B.: Fuzzy identity-based encryption. In: Proceedings of the 24th Annual International Conference on Theory and Applications of Cryptographic Techniques, EUROCRYPT 2005, pp. 457–473 (2005)
16.
go back to reference Sebé, F., Domingo-Ferrer, J., Martinez-Balleste, A., Deswarte, Y., Quisquater, J.J.: Efficient remote data possession checking in critical information infrastructures. IEEE Trans. Knowl. Data Eng. 20(8), 1034–1038 (2008)CrossRef Sebé, F., Domingo-Ferrer, J., Martinez-Balleste, A., Deswarte, Y., Quisquater, J.J.: Efficient remote data possession checking in critical information infrastructures. IEEE Trans. Knowl. Data Eng. 20(8), 1034–1038 (2008)CrossRef
17.
go back to reference Shah, M.A., Swaminathan, R., Baker, M.: Privacy-preserving audit and extraction of digital contents. IACR Cryptology ePrint Archive, p. 186 (2008) Shah, M.A., Swaminathan, R., Baker, M.: Privacy-preserving audit and extraction of digital contents. IACR Cryptology ePrint Archive, p. 186 (2008)
18.
go back to reference Song, D.X., Wagner, D., Perrig, A.: Practical techniques for searches on encrypted data. In: 2000 IEEE Symposium on Security and Privacy, S&P 2000, Proceedings, pp. 44–55 (2000) Song, D.X., Wagner, D., Perrig, A.: Practical techniques for searches on encrypted data. In: 2000 IEEE Symposium on Security and Privacy, S&P 2000, Proceedings, pp. 44–55 (2000)
19.
go back to reference Tang, Q.: Towards public key encryption scheme supporting equality test with fine-grained authorization. In: Proceedings of the 16th Australasian Conference on Information Security and Privacy, (ACISP 2011), pp. 389–406 (2011)CrossRef Tang, Q.: Towards public key encryption scheme supporting equality test with fine-grained authorization. In: Proceedings of the 16th Australasian Conference on Information Security and Privacy, (ACISP 2011), pp. 389–406 (2011)CrossRef
20.
go back to reference Tang, Q.: Public key encryption supporting plaintext equality test and user-specified authorization. Secur. Commun. Netw. 5(12), 1351–1362 (2012)CrossRef Tang, Q.: Public key encryption supporting plaintext equality test and user-specified authorization. Secur. Commun. Netw. 5(12), 1351–1362 (2012)CrossRef
21.
go back to reference Wang, Q., Peng, L., Xiong, H., Sun, J., Qin, Z.: Ciphertext-policy attribute-based encryption with delegated equality test in cloud computing. IEEE Access PP, 1 (2017)CrossRef Wang, Q., Peng, L., Xiong, H., Sun, J., Qin, Z.: Ciphertext-policy attribute-based encryption with delegated equality test in cloud computing. IEEE Access PP, 1 (2017)CrossRef
22.
go back to reference Wu, L., Zhang, Y., Choo, K.K.R., He, D.: Efficient and secure identity-based encryption scheme with equality test in cloud computing. Futur. Gener. Comput. Syst. 73(C), 22–31 (2017)CrossRef Wu, L., Zhang, Y., Choo, K.K.R., He, D.: Efficient and secure identity-based encryption scheme with equality test in cloud computing. Futur. Gener. Comput. Syst. 73(C), 22–31 (2017)CrossRef
24.
go back to reference Zhang, R., Ma, H., Lu, Y.: Fine-grained access control system based on fully outsourced attribute-based encryption. J. Syst. Softw. 125, 344–353 (2017)CrossRef Zhang, R., Ma, H., Lu, Y.: Fine-grained access control system based on fully outsourced attribute-based encryption. J. Syst. Softw. 125, 344–353 (2017)CrossRef
25.
go back to reference Zheng, Q., Xu, S., Ateniese, G.: Vabks: Verifiable attribute-based keyword search over outsourced encrypted data. In: IEEE International Conference on Computer (IEEE INFOCOM 2014), pp. 522-530 (2014) Zheng, Q., Xu, S., Ateniese, G.: Vabks: Verifiable attribute-based keyword search over outsourced encrypted data. In: IEEE International Conference on Computer (IEEE INFOCOM 2014), pp. 522-530 (2014)
26.
go back to reference Zhu, H., Wang, L., Ahmad, H., Niu, X.: Key-policy attribute-based encryption with equality test in cloud computing. IEEE Access 5, 20428–20439 (2017)CrossRef Zhu, H., Wang, L., Ahmad, H., Niu, X.: Key-policy attribute-based encryption with equality test in cloud computing. IEEE Access 5, 20428–20439 (2017)CrossRef
27.
go back to reference Zhu, S., Yang, X.: Protecting data in cloud environment with attribute-based encryption. Int. J. Grid Util. Comput. 6(2), 91–97 (2015)CrossRef Zhu, S., Yang, X.: Protecting data in cloud environment with attribute-based encryption. Int. J. Grid Util. Comput. 6(2), 91–97 (2015)CrossRef
Metadata
Title
Fine-Grained Attribute-Based Encryption Scheme Supporting Equality Test
Authors
Nabeil Eltayieb
Rashad Elhabob
Alzubair Hassan
Fagen Li
Copyright Year
2018
DOI
https://doi.org/10.1007/978-3-030-05063-4_18

Premium Partner