Statistically Consistent Broadcast Authenticated Encryption with Keyword Search Adaptive Security from Standard Assumptions

被引:1
作者
Mukherjee, Sayantan [1 ]
机构
[1] Indian Inst Technol, Dept Comp Sci & Engn, Jammu, India
来源
INFORMATION SECURITY AND PRIVACY, ACISP 2023 | 2023年 / 13915卷
关键词
PUBLIC-KEY ENCRYPTION; IDENTITY-BASED ENCRYPTION; SHORT CIPHERTEXTS; GUESSING ATTACKS; IBE;
D O I
10.1007/978-3-031-35486-1_23
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Searchable Encryption (SE) allows users to perform a keyword search over encrypted documents. In Eurocrypt'04, Boneh et al. introduced Public-key Encryption with Keyword Search (PEKS). Broadcast Encryption with Keyword Search (BEKS) is a natural progression to allow some amount of access control. Unfortunately, PEKS and BEKS suffer from keyword-guessing attacks (KGA). In the case of KGA, an adversary guesses the keyword encoded in a trapdoor by creating a ciphertext on a sequence of keywords of its choice and testing them against the trapdoor. In ACISP'21, Liu et al. introduced a variant of BEKS called Broadcast Authenticated Encryption with Keyword Search (BAEKS), which tried to mitigate KGA in BEKS. This construction did not argue consistency and achieved weaker security in the random oracle model. In this work, we first introduce the notion of consistency for BAEKS and introduce security models much stronger than those of Liu et al. We propose a new statistically-consistent construction of BAEKS in the standard model that achieves security in the newly introduced models. Our proposal is proven adaptively secure under the well-studied bilateral Matrix Diffie-Hellman Assumption and still achieves asymptotic efficiency similar to that of Liu et al.
引用
收藏
页码:523 / 552
页数:30
相关论文
共 23 条
  • [1] Searchable encryption revisited: Consistency properties, relation to anonymous IBE, and extensions
    Abdalla, Michel
    Bellare, Mihir
    Catalano, Dario
    Kiltz, Eike
    Kohno, Tadayoshi
    Lange, Tanja
    Malone-Lee, John
    Neven, Gregory
    Paillier, Pascal
    Shi, Haixia
    [J]. JOURNAL OF CRYPTOLOGY, 2008, 21 (03) : 350 - 391
  • [2] Attrapadung N, 2006, LECT NOTES COMPUT SC, V4284, P161
  • [3] Baek J, 2008, LECT NOTES COMPUT SC, V5072, P1249, DOI 10.1007/978-3-540-69839-5_96
  • [4] Boneh D, 2005, LECT NOTES COMPUT SC, V3621, P258
  • [5] Hierarchical identity based encryption with constant size ciphertext
    Boneh, D
    Boyen, X
    Goh, EJ
    [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2005,PROCEEDINGS, 2005, 3494 : 440 - 456
  • [6] Boneh D, 2004, LECT NOTES COMPUT SC, V3027, P506
  • [7] Boneh D, 2004, LECT NOTES COMPUT SC, V3027, P223
  • [8] Boneh D, 2007, LECT NOTES COMPUT SC, V4392, P535
  • [9] Byun JW, 2006, LECT NOTES COMPUT SC, V4165, P75
  • [10] Keyword Search Meets Membership Testing: Adaptive Security from SXDH
    Chatterjee, Sanjit
    Mukherjee, Sayantan
    [J]. PROGRESS IN CRYPTOLOGY, INDOCRYPT 2018, 2018, 11356 : 21 - 43