Post-Quantum Public-Key Authenticated Searchable Encryption with Forward Security: General Construction, and Applications

被引:1
|
作者
Xu, Shiyuan [1 ]
Cao, Yibo [2 ]
Chen, Xue [1 ,3 ]
Zhao, Yanmin [1 ]
Yiu, Siu-Ming [1 ]
机构
[1] Univ Hong Kong, Dept Comp Sci, Pok Fu Lam, Hong Kong, Peoples R China
[2] Beijing Univ Posts & Telecommun, Sch Cyberspace Secur, Beijing, Peoples R China
[3] Hong Kong Polytech Univ, Dept Comp, Hung Hom, Hong Kong, Peoples R China
来源
INFORMATION SECURITY AND CRYPTOLOGY, INSCRYPT 2023, PT I | 2024年 / 14526卷
关键词
Public-key authenticated encryption with keyword search; Lattice; Forward security; Multi-ciphertext indistinguishability; Trapdoor privacy; Generic construction; KEYWORD SEARCH; DISCRETE LOGARITHMS; ALGORITHMS;
D O I
10.1007/978-981-97-0942-7_14
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Public-key encryption with keyword search (PEKS) was first proposed by Boneh et al. (EUROCRYPT 2004), achieving the ability to search for ciphertext files. Nevertheless, it is vulnerable to inside keyword guessing attacks (IKGA). Public-key authenticated encryption with keyword search (PAEKS), introduced by Huang et al. (Inf. Sci. 2017), on the other hand, is secure against IKGA. Nonetheless, it is susceptible to quantum computing attacks. Liu et al. and Cheng et al. addressed this problem by reducing to the lattice hardness (AsiaCCS 2022, ESORICS 2022). Furthermore, several scholars pointed out that the threat of secret key exposure delegates a severe and realistic concern, potentially leading to privacy disclosure (EUROCRYPT 2003, Compt. J. 2022). As a result, research focusing on mitigating key exposure and resisting quantum attacks for the PAEKS primitive is far-reaching. In this work, we present the first generic construction and instantiation of forward-secure PAEKS primitive based on lattice hardness without trusted authorities, mitigating the secret key exposure while ensuring quantum-safe properties. We extend the scheme of Liu et al. (AsiaCCS 2022), and formalize a novel post-quantum PAEKS construction, namely FS-PAEKS. To begin with, we introduce the binary tree structure to represent the time periods, along with a lattice basis extension algorithm, and SamplePre algorithm to obtain the post-quantum one-way secret key evolution, allowing users to update their secret keys periodically. Furthermore, our scheme is proven to be IND-CKA and IND-IKGA secure in a quantum setting. In addition, we also compare the security of our primitive in terms of computational complexity and communication overhead with other top-tier schemes. Ultimately, we demonstrate two potential applications of FS-PAEKS.
引用
收藏
页码:274 / 298
页数:25
相关论文
共 45 条
  • [31] Stateful Public-Key Encryption Schemes Forward-Secure Against State Exposure
    Baek, Joonsang
    Vu, Quang Hieu
    Shoufan, Abdulhadi
    Jones, Andrew
    Wong, Duncan S.
    COMPUTER JOURNAL, 2013, 56 (04) : 497 - 507
  • [32] An Efficient Forward-Secure Public-Key Encryption Scheme without Random Oracles
    Lu, Yang
    Li, Jiguo
    THIRD INTERNATIONAL SYMPOSIUM ON ELECTRONIC COMMERCE AND SECURITY WORKSHOPS (ISECS 2010), 2010, : 22 - 25
  • [33] A Comparison of Security and its Performance for Key Agreements in Post-Quantum Cryptography
    Borges, Fabio
    Reis, Paulo Ricardo
    Pereira, Diogo
    IEEE ACCESS, 2020, 8 : 142413 - 142422
  • [34] Scan-free verifiable public-key searchable encryption supporting efficient user updates in distributed systems
    Tian, Pengxu
    Guo, Cheng
    Jie, Yingmo
    Liu, Yining
    Yao, Lin
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2023, 74
  • [35] A multi-receiver certificateless public-key searchable encryption: Field-free subset conjunctive and disjunctive
    Chenam, Venkata Bhikshapathi
    Sree, Kondepati Dhana
    Ali, Syed Taqi
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2024, 17 (06) : 3526 - 3541
  • [36] Security analysis of Pan et al.'s "Public-key authenticated encryption with keyword search achieving both multi-ciphertext and multi-trapdoor indistinguishability''
    Cheng, Leixiao
    Meng, Fei
    JOURNAL OF SYSTEMS ARCHITECTURE, 2021, 119
  • [37] Forward-Secure Identity-Based Public-Key Encryption without Random Oracles
    Yu, Jia
    Cheng, Xiangguo
    Hao, Rong
    Kong, Fanyu
    Fan, Jianxi
    FUNDAMENTA INFORMATICAE, 2011, 111 (02) : 241 - 256
  • [38] Post-quantum verifier-based three-party password authenticated key exchange protocol
    Lian H.
    Hou H.
    Zhao Y.
    Tongxin Xuebao/Journal on Communications, 2022, 43 (04): : 95 - 106
  • [39] Scalable CCA-secure public-key authenticated encryption with keyword search from ideal lattices in cloud computing
    Yao, Lisha
    Weng, Jian
    Yang, Anjia
    Liang, Xiaojian
    Wu, Zhenghao
    Jiang, Zike
    Hou, Lin
    INFORMATION SCIENCES, 2023, 624 : 777 - 795
  • [40] A construction of post quantum secure authenticated key agreement design for mobile digital rights management system
    Dadsena, Pradeep Kumar
    Jain, Jainendra
    Rana, Saurabh
    Dharminder, Dharminder
    MULTIMEDIA TOOLS AND APPLICATIONS, 2023, 82 (17) : 26643 - 26660