Research Article

Comparable Encryption Scheme over Encrypted Cloud Data in Internet of Everything

Algorithm 4

Definition of PT-SCESW scheme.
PT-SCESW scheme is a series of algorithms namely Setup, Encryption, Auditing, Comparison
phases, which are shown as follows:
Setup Phase. The DO chooses a security parameter , range parameter and master key
to generate a public parameter . The DO runs KeyGen to produce the secret key
and public key . Setup phase outputs the secret key , public key , public parameter
and master key . Setup phase contains KeyGen algorithm in SCESW scheme. The DO
shares with others and preserves as a secret.
Encryption Phase
(i) Par, Der: system definitions are similar to SCESW scheme, as shown
in Algorithm 3.
(ii) Enc: given a security parameter , range parameter , master
key , public key , private key and num , the DO runs the
algorithm to output a ciphertext , set and the metadata. Then file and set will
be sent by the DO to the CSP. The metadata might be signed and kept by the DO.
Auditing Phase
(i) ChalGen: given the secret parameter , the verifier outputs auditing
challenge for the query.
(ii) ProofGen: given the DO’s public parameter , file , set and
auditing challenge , the TPA outputs the auditing proof to verify that the CSP
owns the outsourced file correctly.
(iii) ProofCheck: given the DO’s public key ,
evidence , metadata and auditing challenge , the TPA outputs correct or .
If the proof passes the verification, the function outputs correct; otherwise, the
function outputs and the system stops to work. At last, TPA sends the auditing
report to the verifier.
Comparison Phase
(i) Cmp: system definition is similar to SCESW scheme, as illustrated
in Algorithm 3.