Post-Quantum Public-Key Authenticated Searchable Encryption with Forward Security: General Construction, and Applications

被引:1
|
作者
Xu, Shiyuan [1 ]
Cao, Yibo [2 ]
Chen, Xue [1 ,3 ]
Zhao, Yanmin [1 ]
Yiu, Siu-Ming [1 ]
机构
[1] Univ Hong Kong, Dept Comp Sci, Pok Fu Lam, Hong Kong, Peoples R China
[2] Beijing Univ Posts & Telecommun, Sch Cyberspace Secur, Beijing, Peoples R China
[3] Hong Kong Polytech Univ, Dept Comp, Hung Hom, Hong Kong, Peoples R China
来源
INFORMATION SECURITY AND CRYPTOLOGY, INSCRYPT 2023, PT I | 2024年 / 14526卷
关键词
Public-key authenticated encryption with keyword search; Lattice; Forward security; Multi-ciphertext indistinguishability; Trapdoor privacy; Generic construction; KEYWORD SEARCH; DISCRETE LOGARITHMS; ALGORITHMS;
D O I
10.1007/978-981-97-0942-7_14
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Public-key encryption with keyword search (PEKS) was first proposed by Boneh et al. (EUROCRYPT 2004), achieving the ability to search for ciphertext files. Nevertheless, it is vulnerable to inside keyword guessing attacks (IKGA). Public-key authenticated encryption with keyword search (PAEKS), introduced by Huang et al. (Inf. Sci. 2017), on the other hand, is secure against IKGA. Nonetheless, it is susceptible to quantum computing attacks. Liu et al. and Cheng et al. addressed this problem by reducing to the lattice hardness (AsiaCCS 2022, ESORICS 2022). Furthermore, several scholars pointed out that the threat of secret key exposure delegates a severe and realistic concern, potentially leading to privacy disclosure (EUROCRYPT 2003, Compt. J. 2022). As a result, research focusing on mitigating key exposure and resisting quantum attacks for the PAEKS primitive is far-reaching. In this work, we present the first generic construction and instantiation of forward-secure PAEKS primitive based on lattice hardness without trusted authorities, mitigating the secret key exposure while ensuring quantum-safe properties. We extend the scheme of Liu et al. (AsiaCCS 2022), and formalize a novel post-quantum PAEKS construction, namely FS-PAEKS. To begin with, we introduce the binary tree structure to represent the time periods, along with a lattice basis extension algorithm, and SamplePre algorithm to obtain the post-quantum one-way secret key evolution, allowing users to update their secret keys periodically. Furthermore, our scheme is proven to be IND-CKA and IND-IKGA secure in a quantum setting. In addition, we also compare the security of our primitive in terms of computational complexity and communication overhead with other top-tier schemes. Ultimately, we demonstrate two potential applications of FS-PAEKS.
引用
收藏
页码:274 / 298
页数:25
相关论文
共 45 条
  • [21] A Blockchain-Based Searchable Public-Key Encryption With Forward and Backward Privacy for Cloud-Assisted Vehicular Social Networks
    Chen, Biwen
    Wu, Libing
    Wang, Huaqun
    Zhou, Lu
    He, Debiao
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2020, 69 (06) : 5813 - 5825
  • [22] PAEWS: Public-Key Authenticated Encryption With Wildcard Search Over Outsourced Encrypted Data
    Luo, Fucai
    Yan, Xingfu
    Yang, Haining
    Zheng, Xiaofan
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2025, 20 : 2212 - 2223
  • [23] Server-Aided Public Key Authenticated Searchable Encryption With Constant Ciphertext and Constant Trapdoor
    Cheng, Leixiao
    Meng, Fei
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2024, 19 : 1388 - 1400
  • [24] A lattice-based designated-server public-key authenticated encryption with keyword search
    Fan, Yajun
    Qin, Baodong
    Zheng, Dong
    JOURNAL OF SYSTEMS ARCHITECTURE, 2023, 145
  • [25] New forward-secure public-key encryption without random oracles
    Lu, Yang
    Li, Jiguo
    INTERNATIONAL JOURNAL OF COMPUTER MATHEMATICS, 2013, 90 (12) : 2603 - 2613
  • [26] Lattice-Based Post-Quantum Public Key Encryption Scheme Using ElGamal's Principles
    Amirkhanova, Dana Sairangazhykyzy
    Iavich, Maksim
    Mamyrbayev, Orken
    CRYPTOGRAPHY, 2024, 8 (03)
  • [27] Privacy leakage of certificateless public key authenticated searchable encryption via frequency analysis: Attacks and revises
    Cheng, Leixiao
    Qin, Jing
    Meng, Fei
    COMPUTER STANDARDS & INTERFACES, 2024, 87
  • [28] RS-PKE: Ranked Searchable Public-Key Encryption for Cloud-Assisted Lightweight Platforms
    Mouri, Israt Jahan
    Ridowan, Muhammad
    Adnan, Muhammad Abdullah
    CODASPY'22: PROCEEDINGS OF THE TWELVETH ACM CONFERENCE ON DATA AND APPLICATION SECURITY AND PRIVACY, 2022, : 324 - 335
  • [29] A new construction of public key authenticated encryption with keyword search based on LWE
    Wang, Ziqing
    Li, Jin
    Liu, Xiaoguang
    Wu, Xinyan
    Li, Fagen
    TELECOMMUNICATION SYSTEMS, 2024, 86 (02) : 229 - 240
  • [30] Public-key authenticated encryption with keyword search achieving both multi-ciphertext and multi-trapdoor indistinguishability
    Pan, Xiangyu
    Li, Fagen
    JOURNAL OF SYSTEMS ARCHITECTURE, 2021, 115