Skip to main content
Log in

PKE-ET-HS: Public Key Encryption with Equality Test for Heterogeneous Systems in IoT

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

With the continuous development of the Internet of Things (IoT), a growing number of users choose to store the data collected from their smart devices on a cloud server for saving costs. However, the security and privacy issues that accompany the cloud-assisted IoT are also becoming increasingly apparent. Considering the untrusted nature of the cloud server, the data accumulated by the smart sensor must be encrypted before outsourcing to the cloud server. Nevertheless, the above mechanism raises another serious problem. For users of another public key cryptosystem, it is impractical to download all the data stored in the cloud to find the data he needs. To solve this problem, we first, proposed a public key encryption with equality test for heterogeneous systems (PKE-ET-HS) which combines the ideas of identity-based encryption with outsourced equality test and public key encryption with equality test. This scheme allows the authorized cloud server to retrieve whether two encryptions encrypted in a heterogeneous system contain equivalent messages. In addition, in the random oracle, the security of the proposed scheme has been given under the bilinear Diffie–Hellman assumption and the computational Diffie–Hellman assumption. Finally, storage size, computation complexity, and properties are compared with other related works. The results show that the PKE-ET-HS scheme proposed in this paper has a good performance.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6

Similar content being viewed by others

References

  1. Harbi, Y., Aliouat, Z., Harous, S., Bentaleb, A., & Refoufi, A. (2019). A review of security in internet of things. Wireless Personal Communications, 108(1), 325–344.

    Article  Google Scholar 

  2. Xiong, H., Mei, Q., Zhao, Y., Peng, L., & Zhang, H. (2019). Scalable and forward secure network attestation with privacy-preserving in cloud-assisted internet of things. IEEE Sensors Journal, 19, 8317–8331.

    Article  Google Scholar 

  3. Prasad, R., & Reichert, F. (2011). Special issue on internet of things and future applications. Wireless Personal Communications, 61(3), 491–493.

    Article  Google Scholar 

  4. Xiong, H., Bao, Y., Nie, X., & Assor, Y. I. (2019). Server-aided attribute-based signature supporting expressive access structures for industrial internet of things. IEEE Transactions on Industrial Informatics, 16, 1013–1023.

    Article  Google Scholar 

  5. Tang, J., Dong, T., Li, L., & Shao, L. (2018). Intelligent monitoring system based on internet of things. Wireless Personal Communications, 102(2), 1521–1537.

    Article  Google Scholar 

  6. Xiong, H., Mei, Q., & Zhao, Y. (2019). Efficient and provably secure certificateless parallel key-insulated signature without pairing for IIoT environments. IEEE Systems Journal, 1–11.

  7. Eltayieb, N., Wang, P., Hassan, A., Elhabob, R., & Li, F. (2019). ASDS: Attribute-based secure data sharing scheme for reliable cloud environment. Security and Privacy, 2(2), e57.

    Article  Google Scholar 

  8. Elhabob, R., Zhao, Y., Sella, I., & Xiong, H. (2019). An efficient certificateless public key cryptography with authorized equality test in IIoT. Journal of Ambient Intelligence and Humanized Computing. https://doi.org/10.1007/s12652-019-01365-4.

    Article  Google Scholar 

  9. Truong, H.-L., & Dustdar, S. (2015). Principles for engineering IoT cloud systems. IEEE Cloud Computing, 2(2), 68–76.

    Article  Google Scholar 

  10. Pitchai, R., Jayashri, S., & Raja, J. (2016). Searchable encrypted data file sharing method using public cloud service for secure storage in cloud computing. Wireless Personal Communications, 90(2), 947–960.

    Article  Google Scholar 

  11. Eltayieb, N., Elhabob, R., Hassan, A., & Li, F. (2020). A blockchain-based attribute-based signcryption scheme to secure data sharing in the cloud. Journal of Systems Architecture, 102, 101653.

    Article  Google Scholar 

  12. Mei, Q., Zhao, Y., & Xiong, H. (2019). A new provably secure certificateless signature with revocation in the standard model. Informatica, 30(4), 711–728.

    Article  Google Scholar 

  13. Sadeghi, A.-R., Wachsmann, C., & Waidner, M. (2015). Security and privacy challenges in industrial internet of things. In Proceedings of the 52nd annual design automation conference (p 54). ACM.

  14. Elhabob, R., Zhao, Y., Sella, I., & Xiong, H. (2019). Efficient certificateless public key cryptography with equality test for internet of vehicles. IEEE Access, 7, 68957–68969.

    Article  Google Scholar 

  15. Xiong, H., Zhao, Y., Peng, L., Zhang, H., & Yeh, K.-H. (2019). Partially policy-hidden attribute-based broadcast encryption with secure delegation in edge computing. Future Generation Computer Systems, 97, 453–461.

    Article  Google Scholar 

  16. Zhou, J., Cao, Z., Dong, X., & Vasilakos, A. V. (2017). Security and privacy for cloud-based IoT: Challenges. IEEE Communications Magazine, 55(1), 26–33.

    Article  Google Scholar 

  17. Esposito, C., Castiglione, A., Martini, B., & Choo, K.-K. R. (2016). Cloud manufacturing: Security, privacy, and forensic concerns. IEEE Cloud Computing, 3(4), 16–22.

    Article  Google Scholar 

  18. Eltayieb, N., Elhabob, R., Hassan, A., & Li, F. (2019). An efficient attribute-based online/offline searchable encryption and its application in cloud-based reliable smart grid. Journal of Systems Architecture, 98, 165–172.

    Article  Google Scholar 

  19. Aziz, A., & Singh, K. (2019). Lightweight security scheme for internet of things. Wireless Personal Communications, 104(2), 577–593.

    Article  Google Scholar 

  20. Elhabob, R., Zhao, Y., Sella, I., & Xiong, H. (2019). Public key encryption with equality test for heterogeneous systems in cloud computing. KSII Transactions on Internet and Information Systems (TIIS), 13(9), 4742–4770.

    Google Scholar 

  21. Boneh, D., Di Crescenzo, G., Ostrovsky, R., & Persiano, G. (2004). Public key encryption with keyword search. In International conference on the theory and applications of cryptographic techniques, (pp 506–522). Springer.

  22. Yang, G., Tan, C. H., Huang, Q., & Wong, D. S. (2010). Probabilistic public key encryption with equality test. In Cryptographers track at the RSA conference, (pp 119–131). Springer.

  23. Tang, Q. (2012). Public key encryption schemes supporting equality test with authorisation of different granularity. International Journal of Applied Cryptography, 2(4), 304–321.

    Article  MathSciNet  Google Scholar 

  24. Huang, K., Tso, R., Chen, Y.-C., Rahman, S. M. M., Almogren, A., & Alamri, A. (2015). Pke-aet: Public key encryption with authorized equality test. The Computer Journal, 58, 2686–2697.

    Article  Google Scholar 

  25. Lee, H. T., Ling, S., Seo, J. H., & Wang, H. (2016). Cca2 attack and modification of Huang et al.’s public key encryption with authorized equality test. The Computer Journal, 59(11), 1689–1694.

    Article  MathSciNet  Google Scholar 

  26. Xu, Y., Wang, M., Zhong, H., Cui, J., Liu, L., & Franqueira, V. N. L. (2017). Verifiable public key encryption scheme with equality test in 5g networks. IEEE Access, 5, 12702–12713.

    Article  Google Scholar 

  27. Elhabob, R., Sella, I., Zhao, Y., Zhu, G., & Xiong, H. (2018). A heterogeneous systems public key encryption with equality test in smart city. In ICEB 2018 Proceedings. 98.

  28. Ma, S. (2016). Identity-based encryption with outsourced equality test in cloud computing. Information Sciences, 328, 389–402.

    Article  Google Scholar 

  29. Baek, J., Safavi-Naini, R., & Susilo, W. (2008). Public key encryption with keyword search revisited. Computational Science and Its Applications-ICCSA, 2008, 1249–1259.

    MATH  Google Scholar 

  30. Abdalla, M., Bellare, M., Catalano, D., Kiltz, E., Kohno, T., Lange, T., Malone-Lee, J., Neven, G., Paillier, P., & Shi, H. (2005). Searchable encryption revisited: Consistency properties, relation to anonymous ibe, and extensions. In Crypto (vol. 3621, pp. 205–222). Springer.

  31. Tang, Q. (2011). Towards public key encryption scheme supporting equality test with fine-grained authorization. In Australasian conference on information security and privacy (pp 389–406). Springer.

  32. Tang, Q. (2012). Public key encryption supporting plaintext equality test and user-specified authorization. Security and Communication Networks, 5(12), 1351–1362.

    Article  Google Scholar 

  33. Ma, S., Zhang, M., Huang, Q., & Yang, B. (2014). Public key encryption with delegated equality test in a multi-user setting. The Computer Journal, 54, 986–1002.

    Google Scholar 

  34. Ma, S., Huang, Q., Zhang, M., & Yang, B. (2015). Efficient public key encryption with equality test supporting flexible authorization. IEEE Transactions on Information Forensics and Security, 10(3), 458–470.

    Article  Google Scholar 

  35. Lee, H. T., Ling, S., Seo, J. H., & Wang, H. (2016). Semi-generic construction of public key encryption and identity-based encryption with equality test. Information Sciences, 373, 419–440.

    Article  Google Scholar 

  36. Wu, L., Zhang, Y., Choo, K.-K. R., & He, D. (2017). Efficient and secure identity-based encryption scheme with equality test in cloud computing. Future Generation Computer Systems, 73, 22–31.

    Article  Google Scholar 

  37. Elhabob, R., Zhao, Y., Eltayieb, N., Abdelgader, A. M. S., & Xiong, H. (2019). Identity-based encryption with authorized equivalence test for cloud-assisted IoT. Cluster Computing. https://doi.org/10.1007/s10586-019-02979-1.

    Article  Google Scholar 

  38. Boneh, D., & Franklin, M.. (2001). Identity-based encryption from the weil pairing. In Annual international cryptology conference (pp. 213–229). Springer.

  39. Lynn, B. (2013). The stanford pairing based crypto library. Privacy Preservation Scheme for Multicast Communications in Smart Buildings of the Smart Grid, 324.

Download references

Acknowledgements

This work was supported in part by the Natural Science Foundation of China under Grant U1936101, in part by the 13th Five-Year Plan of National Cryptography Development Fund for Cryptographic Theory of China under Grant MMJJ20170204, the Guangxi Colleges and Universities Key Laboratory of Cloud Computing and Complex Systems and in part by the Sichuan Science and Technology Project under Grant 2018KZ0007.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Hu Xiong.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Elhabob, R., Zhao, Y., Hassan, A. et al. PKE-ET-HS: Public Key Encryption with Equality Test for Heterogeneous Systems in IoT. Wireless Pers Commun 113, 313–335 (2020). https://doi.org/10.1007/s11277-020-07190-9

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-020-07190-9

Keywords

Navigation