• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Wu Libing, Zhang Yubo, He Debiao. Dual Server Identity-Based Encryption with Equality Test for Cloud Computing[J]. Journal of Computer Research and Development, 2017, 54(10): 2232-2243. DOI: 10.7544/issn1000-1239.2017.20170446
Citation: Wu Libing, Zhang Yubo, He Debiao. Dual Server Identity-Based Encryption with Equality Test for Cloud Computing[J]. Journal of Computer Research and Development, 2017, 54(10): 2232-2243. DOI: 10.7544/issn1000-1239.2017.20170446

Dual Server Identity-Based Encryption with Equality Test for Cloud Computing

More Information
  • Published Date: September 30, 2017
  • With the rapid development of cloud storage and the increasing awareness of privacy, more and more private data are encrypted before outsourcing to the cloud. Thus, how to search in encrypted data has been a new research item in the scope of searchable encryption. One of the solutions is public key encryption with equality test (PKEET). It can check whether the plaintexts of two ciphertexts encrypted under different public keys are the same, without leakage any information about the plaintexts. Recently, many public key encryption schemes with equality test have been proposed. However, in these schemes, there were only one server be used to perform the equality test, which means that they could not withstand the inner keywords guessing attack. To solve this problem, we propose the first dual server identity-based encryption scheme with equality test (DS-IBEET). And we prove the security under random oracle model. In addition, performance evaluation shows that our scheme is suitable for resource-limited mobile devices.
  • Related Articles

    [1]Li Yuxi, Chen Jingjing, Zhuo Fucai, Xu Jian, Ji Dong. Verifiable Boolean Searchable Encryption Based on Blockchain Index[J]. Journal of Computer Research and Development. DOI: 10.7544/issn1000-1239.202440501
    [2]Qi Lijun, Zhuang Jincheng. A Searchable Encryption Scheme Based on Approximate Trapdoor Sampling[J]. Journal of Computer Research and Development. DOI: 10.7544/issn1000-1239.202440482
    [3]Tang Yongli, Li Jingran, Yan Xixi, Zhao Qiang. A Forward Secure Dynamic Searchable Encryption Scheme Supporting Conjunctive Search[J]. Journal of Computer Research and Development, 2022, 59(8): 1853-1866. DOI: 10.7544/issn1000-1239.20210260
    [4]Guo Sixu, He Shen, Su Li, Zhang Xing, Zhou Fucai, Zhang Xinyue. Top-k Boolean Searchable Encryption Scheme Based on Multiple Keywords[J]. Journal of Computer Research and Development, 2022, 59(8): 1841-1852. DOI: 10.7544/issn1000-1239.20200605
    [5]Niu Shufen, Xie Yaya, Yang Pingping, Du Xiaoni. Cloud-Assisted Attribute-Based Searchable Encryption Scheme on Blockchain[J]. Journal of Computer Research and Development, 2021, 58(4): 811-821. DOI: 10.7544/issn1000-1239.2021.20200041
    [6]Xu Guangwei, Shi Chunhong, Wang Wentao, Pan Qiao, Li Feng. Multi-Keyword Searchable Encryption Algorithm Based on Semantic Extension[J]. Journal of Computer Research and Development, 2019, 56(10): 2193-2206. DOI: 10.7544/issn1000-1239.2019.20190378
    [7]Li Yuxi, Zhou Fucai, Xu Jian, Xu Zifeng. Multiple-Keyword Encrypted Search with Relevance Ranking on Dual-Server Model[J]. Journal of Computer Research and Development, 2018, 55(10): 2149-2163. DOI: 10.7544/issn1000-1239.2018.20180433
    [8]Xu Qian, Tan Chengxiang, Fan Zhijie, Feng Jun, Zhu Wenye, Xiao Ya. An Efficient Searchable Encryption Scheme with Designed Tester and Revocable Proxy Re-Encryption[J]. Journal of Computer Research and Development, 2018, 55(5): 994-1013. DOI: 10.7544/issn1000-1239.2018.20161051
    [9]Su Hang, Zhu Zhiqiang, Sun Lei. Attribute-Based Encryption with Keyword Search in Mobile Cloud Storage[J]. Journal of Computer Research and Development, 2017, 54(10): 2369-2377. DOI: 10.7544/issn1000-1239.2017.20170431
    [10]Dong Xiaolei, Zhou Jun, Cao Zhenfu. Research Advances on Secure Searchable Encryption[J]. Journal of Computer Research and Development, 2017, 54(10): 2107-2120. DOI: 10.7544/issn1000-1239.2017.20170627

Catalog

    Article views (1422) PDF downloads (801) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return