2019
DOI: 10.1109/access.2019.2899680
|View full text |Cite
|
Sign up to set email alerts
|

Authorized Equality Test on Identity-Based Ciphertexts for Secret Data Sharing via Cloud Storage

Abstract: With the higher rate of using cloud storage, protecting data privacy becomes an important issue. The most effective solution is to encrypt data before uploading to the cloud. However, how to efficiently search over data encrypted with different keys is still an open problem. To address this problem, we introduce a new notion of the identity-based encryption with equality test supporting flexible authorization (IBEET-FA). It supports the test of whether two ciphertexts encrypted under the different keys encapsu… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
19
0

Year Published

2019
2019
2021
2021

Publication Types

Select...
5
2

Relationship

1
6

Authors

Journals

citations
Cited by 33 publications
(19 citation statements)
references
References 28 publications
0
19
0
Order By: Relevance
“…Table 3 and Figure 4 display the time consumed during the Encryption and Decryption algorithms for the AET-IBC scheme compared with other's scheme. It can be seen that our scheme achieve better performance than 19,24,25 in terms of Encryption and Decryption. This is because our proposed scheme is free from pairing operations during the encryption phase as well as it requires less pairing during decryption phase.…”
Section: Computation Costmentioning
confidence: 91%
See 2 more Smart Citations
“…Table 3 and Figure 4 display the time consumed during the Encryption and Decryption algorithms for the AET-IBC scheme compared with other's scheme. It can be seen that our scheme achieve better performance than 19,24,25 in terms of Encryption and Decryption. This is because our proposed scheme is free from pairing operations during the encryption phase as well as it requires less pairing during decryption phase.…”
Section: Computation Costmentioning
confidence: 91%
“…Table 3 and Figure 5 present the time consume during the authorization and test phases. For the Type-2 and Type-3 authorizations, our scheme has a lower cost than, 24,25 whereas it is slightly higher than. 19 However, we still achieve lower computation costs than 19,24,25 in terms of Type-4 authorization and Test i (1 ≤ i ≤ 4), due to less pairing operations.…”
Section: Computation Costmentioning
confidence: 92%
See 1 more Smart Citation
“…In order to solve the problem of certificate management, [16]- [20] proposed schemes of identity-based encryption with equality test (IBEET) by combining PKEET and IBE. Besides, [21]- [24] proposed schemes of attribute-based encryption with equality test (ABEET) in order to achieve more flexible authorization, which is a combination of PKEET and ABE.…”
Section: B Related Work 1) Pkeetmentioning
confidence: 99%
“…Only when a set of conditions is satisfied can ciphertext conversion be performed. Li et al [36] introduced a novel identity-based encryption to implement a secret sharing scheme that supports decrypting two ciphertexts by different keys. This work has solved the problem of third party access rights’ control in the cloud server.…”
Section: Related Workmentioning
confidence: 99%