Subversion-resistant public-key searchable encryption for data sharing in IIoT

被引:0
|
作者
Zhou, Rang [1 ]
He, Yongkang [1 ]
Li, Wanpeng [2 ]
Wang, Yanping [3 ]
Zhang, Xiaojun [4 ]
机构
[1] Chengdu Univ Technol, Coll Comp Sci & Cyber Secur, Chengdu 610059, Peoples R China
[2] Univ Aberdeen, Dept Comp Sci, Aberdeen, Scotland
[3] Xihua Univ, Sch Comp & Software Engn, Chengdu 610039, Peoples R China
[4] Southwest Petr Univ, Sch Comp Sci & Software Engn, Chengdu 610500, Peoples R China
基金
中国国家自然科学基金;
关键词
Searchable encryption; Cryptographic reverse firewall; Subversion-resistant; Industrial Internet of Things (IIoT); KEYWORD SEARCH; SECURE; SCHEME; INTERNET;
D O I
10.1016/j.sysarc.2025.103370
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The rapid growth of the Industrial Internet of Things (IIoT) has driven companies to leverage its potential for enhancing manufacturing efficiency, relying heavily on data analysis. This has led to the collection of vast IIoT data volumes, often stored securely on encrypted cloud servers. To facilitate streamlined data retrieval, keyword search technology is widely employed. Traditional keyword searchable schemes focus on ensuring keyword privacy within the trapdoor and index structures. However, advanced backdoor attacks have emerged as a significant threat. These attacks exploit hidden backdoors in software or hardware, allowing random number manipulation that undermines the security of existing keyword-searchable encryption scheme. To mitigate these attacks, we propose a novel subversion-resistant public-key searchable encryption scheme that incorporates cryptographic reverse firewalls (CRFs). In our scheme, we designed a trust zone to deploy these CRFs. Moreover, the CRFs in the trust zone is randomly chosen to re-randomize the trapdoor and index values, thereby enhancing security against backdoor attacks. Additionally, our scheme facilitates data sharing in the model of one-to-one sending and receiving between different users. Performance testing demonstrates that our scheme requires only lightweight operations for the ReTrapdoor and RePEKS algorithms, making it well-suited for deployment on resource-constrained IIoT devices.
引用
收藏
页数:10
相关论文
共 50 条
  • [41] KA2SE: Key-Aggregation Authorized Searchable Encryption Scheme for Data Sharing in Wireless Sensor Networks
    Wang, Haijiang
    Ning, Jianting
    Wu, Wei
    Lin, Chao
    Zhang, Kai
    IEEE TRANSACTIONS ON SERVICES COMPUTING, 2025, 18 (01) : 226 - 238
  • [42] Public-key authenticated encryption with keyword search revisited: Security model and constructions
    Qin, Baodong
    Chen, Yu
    Huang, Qiong
    Liu, Ximeng
    Zheng, Dong
    INFORMATION SCIENCES, 2020, 516 : 515 - 528
  • [43] Public-Key Encryption with Integrated Keyword Search
    Vishal Saraswat
    Rajeev Anand Sahu
    Gaurav Sharma
    Veronika Kuchta
    Olivier Markowitch
    Journal of Hardware and Systems Security, 2019, 3 (1) : 12 - 25
  • [44] Bi-Deniable Public-Key Encryption
    O'Neill, Adam
    Peikert, Chris
    Waters, Brent
    ADVANCES IN CRYPTOLOGY - CRYPTO 2011, 2011, 6841 : 525 - 542
  • [45] Public-Key Encryption Schemes with Auxiliary Inputs
    Dodis, Yevgeniy
    Goldwasser, Shafi
    Kalai, Yael Tauman
    Peikert, Chris
    Vaikuntanathan, Vinod
    THEORY OF CRYPTOGRAPHY, PROCEEDINGS, 2010, 5978 : 361 - +
  • [46] Password-Authenticated Public-Key Encryption
    Bradley, Tatiana
    Camenisch, Jan
    Jarecki, Stanislaw
    Lehmann, Anja
    Neven, Gregory
    Xu, Jiayu
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, ACNS 2019, 2019, 11464 : 442 - 462
  • [47] Lattice-based public-key encryption with conjunctive keyword search in multi-user setting for IIoT
    Yongli Tang
    Yanpeng Ba
    Lixiang Li
    Xiaojun Wang
    Xixi Yan
    Cluster Computing, 2022, 25 : 2305 - 2316
  • [48] StopGuess: A framework for public-key authenticated encryption with keyword search
    Xiang, Tao
    Wang, Zhongming
    Chen, Biwen
    Li, Xiaoguo
    Wang, Peng
    Chen, Fei
    COMPUTER STANDARDS & INTERFACES, 2024, 88
  • [49] Scan-free verifiable public-key searchable encryption supporting efficient user updates in distributed systems
    Tian, Pengxu
    Guo, Cheng
    Jie, Yingmo
    Liu, Yining
    Yao, Lin
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2023, 74
  • [50] On the Security of a Certificateless Searchable Public Key Encryption Scheme
    Wu, Tsu-Yang
    Meng, Fanya
    Chen, Chien-Ming
    Liu, Shuai
    Pan, Jeng-Shyang
    GENETIC AND EVOLUTIONARY COMPUTING, 2017, 536 : 113 - 119