Post-Quantum Public-Key Authenticated Searchable Encryption with Forward Security: General Construction, and Applications

被引:1
|
作者
Xu, Shiyuan [1 ]
Cao, Yibo [2 ]
Chen, Xue [1 ,3 ]
Zhao, Yanmin [1 ]
Yiu, Siu-Ming [1 ]
机构
[1] Univ Hong Kong, Dept Comp Sci, Pok Fu Lam, Hong Kong, Peoples R China
[2] Beijing Univ Posts & Telecommun, Sch Cyberspace Secur, Beijing, Peoples R China
[3] Hong Kong Polytech Univ, Dept Comp, Hung Hom, Hong Kong, Peoples R China
来源
INFORMATION SECURITY AND CRYPTOLOGY, INSCRYPT 2023, PT I | 2024年 / 14526卷
关键词
Public-key authenticated encryption with keyword search; Lattice; Forward security; Multi-ciphertext indistinguishability; Trapdoor privacy; Generic construction; KEYWORD SEARCH; DISCRETE LOGARITHMS; ALGORITHMS;
D O I
10.1007/978-981-97-0942-7_14
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Public-key encryption with keyword search (PEKS) was first proposed by Boneh et al. (EUROCRYPT 2004), achieving the ability to search for ciphertext files. Nevertheless, it is vulnerable to inside keyword guessing attacks (IKGA). Public-key authenticated encryption with keyword search (PAEKS), introduced by Huang et al. (Inf. Sci. 2017), on the other hand, is secure against IKGA. Nonetheless, it is susceptible to quantum computing attacks. Liu et al. and Cheng et al. addressed this problem by reducing to the lattice hardness (AsiaCCS 2022, ESORICS 2022). Furthermore, several scholars pointed out that the threat of secret key exposure delegates a severe and realistic concern, potentially leading to privacy disclosure (EUROCRYPT 2003, Compt. J. 2022). As a result, research focusing on mitigating key exposure and resisting quantum attacks for the PAEKS primitive is far-reaching. In this work, we present the first generic construction and instantiation of forward-secure PAEKS primitive based on lattice hardness without trusted authorities, mitigating the secret key exposure while ensuring quantum-safe properties. We extend the scheme of Liu et al. (AsiaCCS 2022), and formalize a novel post-quantum PAEKS construction, namely FS-PAEKS. To begin with, we introduce the binary tree structure to represent the time periods, along with a lattice basis extension algorithm, and SamplePre algorithm to obtain the post-quantum one-way secret key evolution, allowing users to update their secret keys periodically. Furthermore, our scheme is proven to be IND-CKA and IND-IKGA secure in a quantum setting. In addition, we also compare the security of our primitive in terms of computational complexity and communication overhead with other top-tier schemes. Ultimately, we demonstrate two potential applications of FS-PAEKS.
引用
收藏
页码:274 / 298
页数:25
相关论文
共 45 条
  • [11] Novel construction of forward-secure public-key encryption in the standard model
    Lu, Y., 1600, Editorial Board of Journal on Communications (35): : 33 - 39+45
  • [12] A Survey on Post-Quantum Public-Key Signature Schemes for Secure Vehicular Communications
    Shim, Kyung-Ah
    IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2022, 23 (09) : 14025 - 14042
  • [13] A forward-secure public-key encryption scheme
    Canetti, R
    Halevi, S
    Katz, J
    ADVANCES IN CRYPTOLOGY-EUROCRYPT 2003, 2003, 2656 : 255 - 271
  • [14] A more efficient public-key authenticated encryption scheme with keyword search
    Huang, Qiong
    Huang, Peisen
    Li, Hongbo
    Huang, Jianye
    Lin, Hongyuan
    JOURNAL OF SYSTEMS ARCHITECTURE, 2023, 137
  • [15] Subversion-resistant public-key searchable encryption for data sharing in IIoT
    Zhou, Rang
    He, Yongkang
    Li, Wanpeng
    Wang, Yanping
    Zhang, Xiaojun
    JOURNAL OF SYSTEMS ARCHITECTURE, 2025, 161
  • [16] Provably secure two-party authenticated key agreement protocol for post-quantum environments
    Islam, S. K. Hafizul
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2020, 52
  • [17] Lightweight Multi-User Public-Key Authenticated Encryption With Keyword Search
    Xu, Yongliang
    Cheng, Hang
    Li, Jiguo
    Liu, Ximeng
    Zhang, Xinpeng
    Wang, Meiqing
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2025, 20 : 3234 - 3246
  • [18] Searchable Public-Key Encryption with Data Sharing in Dynamic Groups for Mobile Cloud Storage
    Xia, Qi
    Ni, Jianbing
    Kanpogninge, Ansuura John Bosco Aristotle
    Gee, James C.
    JOURNAL OF UNIVERSAL COMPUTER SCIENCE, 2015, 21 (03) : 440 - 453
  • [19] Lattice-based searchable public-key encryption scheme for secure cloud storage
    Xie, Run
    Xu, Chunxiang
    He, Chanlian
    Zhang, Xiaojun
    INTERNATIONAL JOURNAL OF WEB AND GRID SERVICES, 2018, 14 (01) : 3 - 20
  • [20] Efficient Public-Key Searchable Encryption Scheme From PSI With Scalable Proxy Servers
    Kong, Xiangqian
    Chen, Lanxiang
    Zhu, Yizhao
    Mu, Yi
    IEEE TRANSACTIONS ON SERVICES COMPUTING, 2024, 17 (06) : 3527 - 3540