Skip to main content
Log in

An efficient certificateless public key cryptography with authorized equality test in IIoT

  • Original Research
  • Published:
Journal of Ambient Intelligence and Humanized Computing Aims and scope Submit manuscript

Abstract

Current time organizations have moved from the conventional industries to smart industries by embracing the approach of Industrial Internet of Things (IIoT), which has provided an avenue for the integration of smart devices and communication technologies. IIoT offers reduction of costs on services and technologies since it counts on the flexibility, availability and real-time data processing capabilities of the cloud server. And even with the untrusted nature of the cloud, the privacy and confidentiality of the data outsourced to the cloud has been able to be guaranteed. This has been achieved through encryption techniques apply to the data before outsourcing. This has made it feasible to have the data in the cloud secured. However, the limitation of data recovery due to it having the innate “all-or-nothing” decryption characteristic, results in a challenge in the search functionality for the encrypted data. In order to deal with this challenge, this paper nominates a Certificateless Public Key Cryptography with Authorized Equivalent Test (CL-PKC-AET). Whereby, a cloud server is given authority to actuate if two encryptions consist of the equivalent messages. Furthermore, the extra providence of a fine-grained testing capability to the cloud server makes the CL-PKC-AET scheme adaptable. We define our scheme basing on bilinear pairing and further advocate within the random oracle model its security, based on the Bilinear Diffie-Hellman assumption. Basing on comparison with existing work, our scheme proves to be more effective.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5

Similar content being viewed by others

References

  • Abdalla M, Bellare M, Catalano D, Kiltz E, Kohno T, Lange T, Malone-Lee J, Neven G, Paillier P, Shi H (2005) Searchable encryption revisited: consistency properties, relation to anonymous IBE, and extensions. Crypto 3621:205–222 (Springer)

    MathSciNet  MATH  Google Scholar 

  • Al-Riyami SS, Paterson KG (2003) Certificateless public key cryptography. Asiacrypt 2894:452–473 (Springer)

    MathSciNet  MATH  Google Scholar 

  • Anagnostopoulos I, Zeadally S, Exposito E (2016) Handling big data: research challenges and future directions. J Supercomput 72(4):1494–1516

    Article  Google Scholar 

  • Atzori L, Iera A, Morabito G (2010) The internet of things: a survey. Comput Netw 54(15):2787–2805

    Article  Google Scholar 

  • Baek J, Safavi-Naini R, Susilo W (2008) Public key encryption with keyword search revisited. Comput Sci Appl ICCSA 2008:1249–1259

    MATH  Google Scholar 

  • Boneh D, Di Crescenzo G, Ostrovsky R, Persiano G (2004) Public key encryption with keyword search. In: International conference on the theory and applications of cryptographic techniques, Springer, pp 506–522

  • Elhabob R, Zhao Y, Sella I, Xiong H (2019) Efficient certificateless public key cryptography with equality test for internet of vehicles. IEEE Access, pp 1–1

  • Esposito C, Castiglione A, Martini B, Choo KKR (2016) Cloud manufacturing: security, privacy, and forensic concerns. IEEE Cloud Comput 3(4):16–22

    Article  Google Scholar 

  • Gope P, Das AK, Kumar N, Cheng Y (2019) Lightweight and physically secure anonymous mutual authentication protocol for real-time data access in industrial wireless sensor networks. IEEE transactions on industrial informatics

  • Hassan A, Eltayieb N, Elhabob R, Li F (2018) An efficient certificateless user authentication and key exchange protocol for client-server environment. J Ambient Intell Hum Comput 9(6):1713–1727

    Article  Google Scholar 

  • Huang K, Tso R, Chen YC, Rahman SMM, Almogren A, Alamri A (2015) Pke-aet: Public key encryption with authorized equality test. Comput J 58(10):2686–2697

    Article  Google Scholar 

  • Kim S, Lee I (2018) Iot device security based on proxy re-encryption. J Ambient Intell Hum Comput 9(4):1267–1273

    Article  Google Scholar 

  • Lee HT, Ling S, Seo JH, Wang H (2016) Semi-generic construction of public key encryption and identity-based encryption with equality test. Inf Sci 373:419–440

    Article  Google Scholar 

  • Lynn B (2013) The stanford pairing based crypto library. In: Privacy preservation scheme for multicast communications in smart buildings of the smart grid, pp 324

  • Ma S (2016) Identity-based encryption with outsourced equality test in cloud computing. Inf Sci 328:389–402

    Article  Google Scholar 

  • Ma S, Huang Q, Zhang M, Yang B (2015a) Efficient public key encryption with equality test supporting flexible authorization. IEEE Trans Inf Forensics Secur 10(3):458–470

    Article  Google Scholar 

  • Ma S, Zhang M, Huang Q, Yang B (2015b) Public key encryption with delegated equality test in a multi-user setting. Comput J 58(4):986–1002

    Article  Google Scholar 

  • Molano JIR, Lovelle JMC, Montenegro CE, Granados JJR, Crespo RG (2018) Metamodel for integration of internet of things, social networks, the cloud and industry 4.0. J Ambient Intell Hum Comput 2018:1–15

    Google Scholar 

  • Noroozi M, Eslami Z (2019) Public-key encryption with keyword search: a generic construction secure against online and offline keyword guessing attacks. J Ambient Intell Hum Comput 2019:1–12

    Google Scholar 

  • Premkamal PK, Pasupuleti SK, Alphonse P (2018) A new verifiable outsourced ciphertext-policy attribute based encryption for big data privacy and access control in cloud. J Ambient Intell Hum Comput 2018:1–15

    Google Scholar 

  • Qu H, Yan Z, Lin XJ, Zhang Q, Sun L (2018) Certificateless public key encryption with equality test. Inf Sci 462:76–92

    Article  MathSciNet  Google Scholar 

  • Singh S, Sharma PK, Moon SY, Park JH (2017) Advanced lightweight encryption algorithms for iot devices: survey, challenges and solutions. J Ambient Intell Hum Comput 2017:1–18

    Google Scholar 

  • Tang Q (2011) Towards public key encryption scheme supporting equality test with fine-grained authorization. In: Australasian Conference on Information Security and Privacy, Springer, pp 389–406

  • Tang Q (2012a) Public key encryption schemes supporting equality test with authorisation of different granularity. Int J Appl Cryptogr 2(4):304–321

    Article  MathSciNet  Google Scholar 

  • Tang Q (2012b) Public key encryption supporting plaintext equality test and user-specified authorization. Secur Commun Netw 5(12):1351–1362

    Article  Google Scholar 

  • Truong HL, Dustdar S (2015) Principles for engineering iot cloud systems. IEEE Cloud Comput 2(2):68–76

    Article  Google Scholar 

  • Wang D, Li W, Wang P (2018) Measuring two-factor authentication schemes for real-time data access in industrial wireless sensor networks. IEEE Trans Ind Inf 14(9):4081–4092

    Article  Google Scholar 

  • Wu L, Zhang Y, Choo KKR, He D (2017) Efficient and secure identity-based encryption scheme with equality test in cloud computing. Future Gener Comput Syst 73:22–31

    Article  Google Scholar 

  • Wu L, Zhang Y, Choo KKR, He D (2018) Efficient identity-based encryption scheme with equality test in smart city. IEEE Trans Sustain Comput 3(1):44–55

    Article  Google Scholar 

  • Xu Y, Wang M, Zhong H, Cui J, Liu L, Franqueira VN (2017) Verifiable public key encryption scheme with equality test in 5G networks. IEEE Access

  • Yang G, Tan CH, Huang Q, Wong DS (2010) Probabilistic public key encryption with equality test. In: CryptographersTrack at the RSA Conference, Springer, pp 119–131

Download references

Acknowledgements

This work was supported in part by the 13th Five-Year Plan of National Cryptography Development Fund for Cryptographic Theory of China under Grant MMJJ20170204, in part by the Fundamental Research Funds for the Central Universities under Grant ZYGX2016J091, the Guangxi Colleges and Universities Key Laboratory of Cloud Computing and Complex Systems, and in part by the Natural Science Foundation of China under Grants U1401257, 61472064 and 61602096.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Hu Xiong.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Elhabob, R., Zhao, Y., Sella, I. et al. An efficient certificateless public key cryptography with authorized equality test in IIoT. J Ambient Intell Human Comput 11, 1065–1083 (2020). https://doi.org/10.1007/s12652-019-01365-4

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12652-019-01365-4

Keywords

Navigation