Post-Quantum Public-Key Authenticated Searchable Encryption with Forward Security: General Construction, and Applications

被引:1
|
作者
Xu, Shiyuan [1 ]
Cao, Yibo [2 ]
Chen, Xue [1 ,3 ]
Zhao, Yanmin [1 ]
Yiu, Siu-Ming [1 ]
机构
[1] Univ Hong Kong, Dept Comp Sci, Pok Fu Lam, Hong Kong, Peoples R China
[2] Beijing Univ Posts & Telecommun, Sch Cyberspace Secur, Beijing, Peoples R China
[3] Hong Kong Polytech Univ, Dept Comp, Hung Hom, Hong Kong, Peoples R China
来源
INFORMATION SECURITY AND CRYPTOLOGY, INSCRYPT 2023, PT I | 2024年 / 14526卷
关键词
Public-key authenticated encryption with keyword search; Lattice; Forward security; Multi-ciphertext indistinguishability; Trapdoor privacy; Generic construction; KEYWORD SEARCH; DISCRETE LOGARITHMS; ALGORITHMS;
D O I
10.1007/978-981-97-0942-7_14
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Public-key encryption with keyword search (PEKS) was first proposed by Boneh et al. (EUROCRYPT 2004), achieving the ability to search for ciphertext files. Nevertheless, it is vulnerable to inside keyword guessing attacks (IKGA). Public-key authenticated encryption with keyword search (PAEKS), introduced by Huang et al. (Inf. Sci. 2017), on the other hand, is secure against IKGA. Nonetheless, it is susceptible to quantum computing attacks. Liu et al. and Cheng et al. addressed this problem by reducing to the lattice hardness (AsiaCCS 2022, ESORICS 2022). Furthermore, several scholars pointed out that the threat of secret key exposure delegates a severe and realistic concern, potentially leading to privacy disclosure (EUROCRYPT 2003, Compt. J. 2022). As a result, research focusing on mitigating key exposure and resisting quantum attacks for the PAEKS primitive is far-reaching. In this work, we present the first generic construction and instantiation of forward-secure PAEKS primitive based on lattice hardness without trusted authorities, mitigating the secret key exposure while ensuring quantum-safe properties. We extend the scheme of Liu et al. (AsiaCCS 2022), and formalize a novel post-quantum PAEKS construction, namely FS-PAEKS. To begin with, we introduce the binary tree structure to represent the time periods, along with a lattice basis extension algorithm, and SamplePre algorithm to obtain the post-quantum one-way secret key evolution, allowing users to update their secret keys periodically. Furthermore, our scheme is proven to be IND-CKA and IND-IKGA secure in a quantum setting. In addition, we also compare the security of our primitive in terms of computational complexity and communication overhead with other top-tier schemes. Ultimately, we demonstrate two potential applications of FS-PAEKS.
引用
收藏
页码:274 / 298
页数:25
相关论文
共 45 条
  • [1] Public-key Authenticated Encryption with Keyword Search: Cryptanalysis, Enhanced Security, and Quantum-resistant Instantiation
    Liu, Zi-Yuan
    Tseng, Yi-Fan
    Tso, Raylin
    Mambo, Masahiro
    Chen, Yu-Chi
    ASIA CCS'22: PROCEEDINGS OF THE 2022 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2022, : 423 - 436
  • [2] Public-Key Authenticated Encryption with Keyword Search: A Generic Construction and Its Quantum-Resistant Instantiation
    Liu, Zi-Yuan
    Tseng, Yi-Fan
    Tso, Raylin
    Mambo, Masahiro
    Chen, Yu-Chi
    COMPUTER JOURNAL, 2022, 65 (10) : 2828 - 2844
  • [3] Certificateless Public Key Authenticated Searchable Encryption With Enhanced Security Model in IIoT Applications
    Cheng, Leixiao
    Meng, Fei
    IEEE INTERNET OF THINGS JOURNAL, 2023, 10 (02): : 1391 - 1400
  • [4] Forward Secure Public-key Authenticated Encryption with Conjunctive Keyword Search
    JIANG, Z. H. E.
    ZHANG, K. A., I
    WANG, L. I. A. N. G. L. I. A. N. G.
    NING, J. I. A. N. T. I. N. G.
    COMPUTER JOURNAL, 2023, 66 (09) : 2265 - 2278
  • [5] Towards security recommendations for public-key infrastructures for production environments in the post-quantum era
    Yunakovsky, Sergey E.
    Kot, Maxim
    Pozhar, Nikolay
    Nabokov, Denis
    Kudinov, Mikhail
    Guglya, Anton
    Kiktenko, Evgeniy O.
    Kolycheva, Ekaterina
    Borisov, Alexander
    Fedorov, Aleksey K.
    EPJ QUANTUM TECHNOLOGY, 2021, 8 (01)
  • [6] StopGuess: A framework for public-key authenticated encryption with keyword search
    Xiang, Tao
    Wang, Zhongming
    Chen, Biwen
    Li, Xiaoguo
    Wang, Peng
    Chen, Fei
    COMPUTER STANDARDS & INTERFACES, 2024, 88
  • [7] Lightweight Searchable Public-Key Encryption with Forward Privacy over IIoT Outsourced Data
    Chen, Biwen
    Wu, Libing
    Kumar, Neeraj
    Choo, Kim-Kwang Raymond
    He, Debiao
    IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING, 2021, 9 (04) : 1753 - 1764
  • [8] On the Security of a Certificateless Searchable Public Key Encryption Scheme
    Wu, Tsu-Yang
    Meng, Fanya
    Chen, Chien-Ming
    Liu, Shuai
    Pan, Jeng-Shyang
    GENETIC AND EVOLUTIONARY COMPUTING, 2017, 536 : 113 - 119
  • [9] A Parallel and Forward Private Searchable Public-Key Encryption for Cloud-Based Data Sharing
    Chen, Biwen
    Wu, Libing
    Li, Li
    Choo, Kim-Kwang Raymond
    He, Debiao
    IEEE ACCESS, 2020, 8 : 28009 - 28020
  • [10] Toward Data Security in 6G Networks: A Public-Key Searchable Encryption Approach
    Shi, Junbin
    Yu, Yong
    Yu, Qiming
    Li, Huilin
    Wang, Lianhai
    IEEE NETWORK, 2022, 36 (04): : 166 - 173