Identity-based encryption with authorized equivalence test for cloud-assisted IoT (original) (raw)

References

  1. Fang, X., Misra, S., Xue, G., Yang, D.: Smart grid the new and improved grid: a survey. IEEE Commun. Surv. Tutor. 14(4), 944–980 (2012)
    Article Google Scholar
  2. Eltayieb, N., Elhabob, R., Hassan, A., Li, F.: An efficient attribute-based online/offline searchable encryption and its application in cloud-based reliable smart grid. J. Syst. Archit. 98, 165–172 (2019)
    Article Google Scholar
  3. Galloway, B., Hancke, G.P.: Introduction to industrial control networks. IEEE Commun. Surv. Tutor. 15(2), 860–880 (2013)
    Article Google Scholar
  4. Toor, Y., Muhlethaler, P., Laouiti, A., De La Fortelle, A.: Vehicle ad hoc networks: applications and related technical issues. IEEE Commun. Surv. Tutor. 10(3), 74–88 (2008)
    Article Google Scholar
  5. Zhang, K., Ni, J., Yang, K., Liang, X., Ren, J., Shen, X.S.: Security and privacy in smart city applications: challenges and solutions. IEEE Commun. Mag. 55(1), 122–129 (2017)
    Article Google Scholar
  6. Elhabob, R., Sella, I., Zhao, Y., Zhu, G., Xiong, H.: A heterogeneous systems public key encryption with equality test in smart city. In: Proceedings of The 18th International Conference on Electronic Business. ICEB, Guilin(2018)
  7. Atzori, L., Iera, A., Morabito, G.: The internet of things: a survey. Comput. Netw. 54(15), 2787–2805 (2010)
    Article Google Scholar
  8. Gubbi, J., Buyya, R., Marusic, S., Palaniswami, M.: Internet of things (iot): a vision, architectural elements, and future directions. Fut. Gener. Comput. Syst. 29(7), 1645–1660 (2013)
    Article Google Scholar
  9. Xiao, Z., Xiao, Y.: Security and privacy in cloud computing. IEEE Commun. Surv. Tutor. 15(2), 843–859 (2013)
    Article Google Scholar
  10. Elhabob, R., Zhao, Y., Sella, I., Xiong, H.: An efficient certificateless public key cryptography with authorized equality test in IIot. J. Ambient Intell. Hum. Comput. (2019). https://doi.org/10.1007/s12652-019-01365-4
    Article Google Scholar
  11. Truong, H.-L., Dustdar, S.: Principles for engineering IoT cloud systems. IEEE Cloud Comput. 2(2), 68–76 (2015)
    Article Google Scholar
  12. Sharma, S., Chang, V., Tim, U.S., Wong, J., Gadia, S.: Cloud and iot-based emerging services systems. Clust. Comput. 22, 71–91 (2019)
    Article Google Scholar
  13. Zhou, J., Cao, Z., Dong, X., Vasilakos, A.V.: Security and privacy for cloud-based IoT: challenges. IEEE Commun. Mag. 55(1), 26–33 (2017)
    Article Google Scholar
  14. Miloslavskaya, N., Tolstoy, A.: Internet of things: information security challenges and solutions. Clust. Comput. 22, 103–119 (2019)
    Article Google Scholar
  15. Xiong, H., Zhao, Y., Peng, L., Zhang, H., Yeh, K.-H.: Partially policy-hidden attribute-based broadcast encryption with secure delegation in edge computing. Fut. Gener. Comput. Syst. 97, 453–461 (2019)
    Article Google Scholar
  16. Boneh, D., Di Crescenzo, G., Ostrovsky, R., Persiano, G.: Public key encryption with keyword search. In: International Conference on the Theory and Applications of Cryptographic Techniques, pp. 506–522. Springer, Berlin (2004)
  17. Yang, G., Tan, C.H., Huang, Q., Wong, D.S.: Probabilistic public key encryption with equality test. In Cryptographers Track at the RSA Conference, pp. 119–131. Springer, Berlin (2010)
  18. Xiong, H., Zhang, H., Sun, J.: Attribute-based privacy-preserving data sharing for dynamic groups in cloud computing. IEEE Syst. J. (2018). https://doi.org/10.1109/JSYST.2018.2865221
    Article Google Scholar
  19. Ma, S., Huang, Q., Zhang, M., Yang, B.: Efficient public key encryption with equality test supporting flexible authorization. IEEE Trans. Inf. Forensics Secur. 10(3), 458–470 (2015)
    Article Google Scholar
  20. Elhabob, R., Zhao, Y., Sella, I., Xiong, H.: Efficient certificateless public key cryptography with equality test for internet of vehicles. IEEE Access (2019). https://doi.org/10.1109/ACCESS.2019.2917326
    Article Google Scholar
  21. Shamir, A.: Identity-based cryptosystems and signature schemes. In: Workshop on the Theory and Application of Cryptographic Techniques, pp. 47–53. Springer, Berlin (1984)
  22. Li, H., Huang, Q., Ma, S., Shen, J., Susilo, W.: Authorized equality test on identity-based ciphertexts for secret data sharing via cloud storage. IEEE Access 7, 25409–25421 (2019)
    Article Google Scholar
  23. Xiong, H., Bao, Y., Nie, X., Assor, Y.I.: Server-aided attribute-based signature supporting expressive access structures for industrial internet of things. IEEE Trans. Ind. Inf. (2019). https://doi.org/10.1109/TII.2018.2813304
    Article Google Scholar
  24. Song, Dawn Xiaoding, Wagner, David, Perrig, Adrian: Practical techniques for searches on encrypted data. In: Proceedings 2000 IEEE Symposium on Security and Privacy. S&P 2000, pp. 44–55. IEEE (2000)
  25. Zhang, J., Mao, J.: Efficient public key encryption with revocable keyword search in cloud computing. Clust. Comput. 19(3), 1211–1217 (2016)
    Article Google Scholar
  26. Behnia, R., Ozmen, M.R., Yavuz, A.A.: Lattice-based public key searchable encryption from experimental perspectives. IEEE Trans. Dependable Secure Comput. (2018). https://doi.org/10.1109/TDSC.2018.2867462
    Article Google Scholar
  27. Lu, Y., Li, J.: Efficient searchable public key encryption against keyword guessing attacks for cloud-based EMR systems. Clust. Comput. 22, 285–299 (2019)
    Article Google Scholar
  28. Abdalla, M., Bellare, M., Catalano, D., Kiltz, E., Kohno, T., Lange, T., Malone-Lee, J., Neven, G., Paillier, P., Shi, H.: Searchable encryption revisited: consistency properties, relation to anonymous ibe, and extensions. J. Cryptol. 21(3), 350–391 (2008)
    Article MathSciNet Google Scholar
  29. Tang, Q.: Towards public key encryption scheme supporting equality test with fine-grained authorization. In: Australasian Conference on Information Security and Privacy, pp. 389–406. Springer, Berlin (2011)
  30. Tang, Q.: Public key encryption schemes supporting equality test with authorisation of different granularity. Int. J. Appl. Cryptogr. 2(4), 304–321 (2012)
    Article MathSciNet Google Scholar
  31. Tang, Q.: Public key encryption supporting plaintext equality test and user-specified authorization. Secur. Commun. Netw. 5(12), 1351–1362 (2012)
    Article Google Scholar
  32. Ma, S., Zhang, M., Huang, Q., Yang, B.: Public key encryption with delegated equality test in a multi-user setting. Comput. J. 58(4), 986–1002 (2015)
    Article Google Scholar
  33. Huang, K., Tso, R., Chen, Y.-C., Mizanur, S.M., Rahman, A.A., Alamri, A.: Pke-aet: public key encryption with authorized equality test. Comput. J. 58(10), 2686–2697 (2015)
    Article Google Scholar
  34. Yan, X., Wang, M., Zhong, H., Cui, J., Liu, L., Franqueira, V.N.L.: Verifiable public key encryption scheme with equality test in 5g networks. IEEE Access 5, 12702–12713 (2017)
    Article Google Scholar
  35. Ma, S.: Identity-based encryption with outsourced equality test in cloud computing. Inf. Sci. 328, 389–402 (2016)
    Article Google Scholar
  36. Lee, H.T., Ling, S., Seo, J.H., Wang, H.: Semi-generic construction of public key encryption and identity-based encryption with equality test. Inf. Sci. 373, 419–440 (2016)
    Article Google Scholar
  37. Libing, W., Zhang, Y., Choo, K.-K.R., He, D.: Efficient and secure identity-based encryption scheme with equality test in cloud computing. Fut. Gener. Comput. Syst. 73, 22–31 (2017)
    Article Google Scholar
  38. Libing, W., Zhang, Y., Choo, K.-K.R., He, D.: Efficient identity-based encryption scheme with equality test in smart city. IEEE Trans. Sustain. Comput. 3(1), 44–55 (2018)
    Article Google Scholar
  39. Ramadan, M., Liao, Y., Li, F., Zhou, S., Abdalla, H.: IBEET-RSA: identity-based encryption with equality test over rsa for wireless body area networks. Mobile Netw. Appl. (2019). https://doi.org/10.1007/s11036-019-01215-9
    Article Google Scholar
  40. Boneh, D., Franklin, M.: Identity-based encryption from the weil pairing. In: Annual International Cryptology Conference, pp. 213–229. Springer, Berlin (2001)
  41. Lynn, B., et al.: The Stanford pairing based crypto library. http://crypto.stanford.edu/pbc/ (2006). Accessed 27, March 2013

Download references