Abstract
The data of user should be protected against untrusted cloud server. A simple way is to use cryptographic methods. Attribute-based encryption (ABE) plays a vital role in securing many applications, particularly in cloud computing. In this paper, we propose a scheme called fine-grained attribute-based encryption supporting equality test (FG-ABEET). The proposed scheme grants the cloud server to perform if two ciphertexts are encryptions of the same message encrypted with the same access policy or different access policy. Moreover, the cloud server can perform the equality test operation without knowing anything about the message encrypted under either access policy. The FG-ABEET scheme is proved to be secure under Decisional Bilinear Diffe-Hellman (DBDH) assumption. In addition, the performance comparisons reveal that the proposed FG-ABEET scheme is efficient and practical.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Abdalla, M., Bellare, M., Catalano, D., Kiltz, E., Kohno, T., Lange, T., Malone-Lee, J., Neven, G., Paillier, P., Shi, H.: Searchable encryption revisited: consistency properties, relation to anonymous ibe, and extensions. J. Cryptol. 21, 350–391 (2005)
Benaloh, J., Leichter, J.: Generalized secret sharing and monotone functions. In: Goldwasser, S. (ed.) CRYPTO 1988. LNCS, vol. 403, pp. 27–35. Springer, New York (1990). https://doi.org/10.1007/0-387-34799-2_3
Bethencourt, J., Sahai, A., Waters, B.: Ciphertext-policy attribute-based encryption. In: 2007 IEEE Symposium on Security and Privacy (SP 2007), pp. 321–334 (2007)
Boneh, D., Di Crescenzo, G., Ostrovsky, R., Persiano, G.: Public key encryption with keyword search. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 506–522. Springer, Heidelberg (2004). https://doi.org/10.1007/978-3-540-24676-3_30
Cheung, L., Newport, C.: Provably secure ciphertext policy ABE. In: 14th ACM Conference on Computer and Communications Security (CCS 2007), pp. 456–465 (2007)
Goyal, V., Pandey, O., Sahai, A., Waters, B.: Attribute-based encryption for fine-grained access control of encrypted data. In: Proceedings of the 13th ACM Conference on Computer and Communications Security, pp. 89–98. ACM (2006)
Li, H., Liu, D., Dai, Y., Luan, T.H., Shen, X.S.: Enabling efficient multi-keyword ranked search over encrypted mobile cloud data through blind storage. IEEE Trans. Emerg. Top. Comput. 3(1), 127–138 (2015)
Li, J., Chen, X., Chow, S.S., Huang, Q., Wong, D.S., Liu, Z.: Multi-authority fine-grained access control with accountability and its application in cloud. J. Netw. Comput. Appl. 112(C), 89–96 (2018)
Li, J., Li, J., Chen, X., Jia, C., Wong, D.S.: Secure outsourced attribute-based encryption. IACR Cryptology ePrint Archive, p, 635 (2012)
Liang, K., Susilo, W.: Searchable attribute-based mechanism with efficient data sharing for secure cloud storage. IEEE Trans. Inf. Forensics Secur. 10(9), 1981–1992 (2015)
Liao, Y., Chen, H., Li, F., Jiang, S., Zhou, S., Mohammed, R.: Insecurity of a key-policy attribute based encryption scheme with equality test. IEEE Access 6, 10189–10196 (2018)
Liu, Z., Luo, J., Xu, L.: A fine-grained attribute-based authentication for sensitive data stored in cloud computing. Int. J. Grid Util. Comput. 7(4), 237–244 (2016)
Ma, S.: Identity-based encryption with outsourced equality test in cloud computing. Inf. Sci. 328, 389–402 (2016)
Phuong, T.V.X., Yang, G., Susilo, W.: Poster: efficient ciphertext policy attribute based encryption under decisional linear assumption. In: Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security (CCS 2014), pp. 1490–1492 (2014)
Sahai, A., Waters, B.: Fuzzy identity-based encryption. In: Proceedings of the 24th Annual International Conference on Theory and Applications of Cryptographic Techniques, EUROCRYPT 2005, pp. 457–473 (2005)
Sebé, F., Domingo-Ferrer, J., Martinez-Balleste, A., Deswarte, Y., Quisquater, J.J.: Efficient remote data possession checking in critical information infrastructures. IEEE Trans. Knowl. Data Eng. 20(8), 1034–1038 (2008)
Shah, M.A., Swaminathan, R., Baker, M.: Privacy-preserving audit and extraction of digital contents. IACR Cryptology ePrint Archive, p. 186 (2008)
Song, D.X., Wagner, D., Perrig, A.: Practical techniques for searches on encrypted data. In: 2000 IEEE Symposium on Security and Privacy, S&P 2000, Proceedings, pp. 44–55 (2000)
Tang, Q.: Towards public key encryption scheme supporting equality test with fine-grained authorization. In: Proceedings of the 16th Australasian Conference on Information Security and Privacy, (ACISP 2011), pp. 389–406 (2011)
Tang, Q.: Public key encryption supporting plaintext equality test and user-specified authorization. Secur. Commun. Netw. 5(12), 1351–1362 (2012)
Wang, Q., Peng, L., Xiong, H., Sun, J., Qin, Z.: Ciphertext-policy attribute-based encryption with delegated equality test in cloud computing. IEEE Access PP, 1 (2017)
Wu, L., Zhang, Y., Choo, K.K.R., He, D.: Efficient and secure identity-based encryption scheme with equality test in cloud computing. Futur. Gener. Comput. Syst. 73(C), 22–31 (2017)
Yang, G., Tan, C.H., Huang, Q., Wong, D.S.: Probabilistic public key encryption with equality test. In: Pieprzyk, J. (ed.) CT-RSA 2010. LNCS, vol. 5985, pp. 119–131. Springer, Heidelberg (2010). https://doi.org/10.1007/978-3-642-11925-5_9
Zhang, R., Ma, H., Lu, Y.: Fine-grained access control system based on fully outsourced attribute-based encryption. J. Syst. Softw. 125, 344–353 (2017)
Zheng, Q., Xu, S., Ateniese, G.: Vabks: Verifiable attribute-based keyword search over outsourced encrypted data. In: IEEE International Conference on Computer (IEEE INFOCOM 2014), pp. 522-530 (2014)
Zhu, H., Wang, L., Ahmad, H., Niu, X.: Key-policy attribute-based encryption with equality test in cloud computing. IEEE Access 5, 20428–20439 (2017)
Zhu, S., Yang, X.: Protecting data in cloud environment with attribute-based encryption. Int. J. Grid Util. Comput. 6(2), 91–97 (2015)
Lynn, B.: The pairing-based cryptography library benchmarks. http://crypto.stanford.edu/pbc/times.html
Acknowledgements
We would like to thank the anonymous reviewers for their valuable comments and suggestions. This work is supported by the National Natural Science Foundation of China (Grant No. 61872058) and Fundamental Research Funds for the Central Universities (Grant No. ZYGX2016J081)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer Nature Switzerland AG
About this paper
Cite this paper
Eltayieb, N., Elhabob, R., Hassan, A., Li, F. (2018). Fine-Grained Attribute-Based Encryption Scheme Supporting Equality Test. In: Vaidya, J., Li, J. (eds) Algorithms and Architectures for Parallel Processing. ICA3PP 2018. Lecture Notes in Computer Science(), vol 11337. Springer, Cham. https://doi.org/10.1007/978-3-030-05063-4_18
Download citation
DOI: https://doi.org/10.1007/978-3-030-05063-4_18
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-05062-7
Online ISBN: 978-3-030-05063-4
eBook Packages: Computer ScienceComputer Science (R0)