TCA-PEKS: Trusted certificateless authentication public-key encryption with keyword search scheme in cloud storage

被引:6
作者
Han, Mu [1 ]
Xu, Puyi [1 ]
Xu, Lei [2 ]
Xu, Chungen [2 ]
机构
[1] Jiangsu Univ, Sch Comp Sci & Commun Engn, Zhenjiang 212000, Jiangsu, Peoples R China
[2] Nanjing Univ Sci & Technol, Sch Math & Stat, Nanjing 210000, Peoples R China
基金
中国国家自然科学基金;
关键词
Public-key searchable encryption; Blockchain; Smart contract; Certificateless cryptosystem; SECURE;
D O I
10.1007/s12083-022-01392-7
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Public key encryption with keyword search (PEKS) technology is capable of achieving accurate ciphertext retrieval while protecting data privacy. However, curious or malicious semi-trusted cloud servers can cause privacy breaches, which then creates a trust problem for ciphertext management and searching. To address this problem, we propose a trusted certificateless authentication public-key encryption with a keyword search scheme in cloud storage (TCA-PEKS), which ensuring trusted retrieval, simultaneously resolves the problems of key escrow and certificate management that exist in PEKS. In the scheme, the security of the ciphertext storage and verifications are strengthened based on blockchain non-tampering features, which assists users in verifying the correctness of a file. In particular, we construct an open and transparent smart contract to limit the malicious behaviour of cloud servers, in which the user's complete private key splits the secret value and the partial private key, further guaranteeing the correctness of the retrieval process. Finally, the scheme is proven to satisfy ciphertext and trapdoor indistinguishability under the random oracle model, and the performance evaluation results show that the scheme is highly efficient.
引用
收藏
页码:156 / 169
页数:14
相关论文
共 28 条
[1]  
Baek J, 2008, LECT NOTES COMPUT SC, V5072, P1249, DOI 10.1007/978-3-540-69839-5_96
[2]  
Boldyreva A, 2009, LECT NOTES COMPUT SC, V5479, P224, DOI 10.1007/978-3-642-01001-9_13
[3]  
Boneh D, 2004, LECT NOTES COMPUT SC, V3027, P506
[4]   A Blockchain-Based Searchable Public-Key Encryption With Forward and Backward Privacy for Cloud-Assisted Vehicular Social Networks [J].
Chen, Biwen ;
Wu, Libing ;
Wang, Huaqun ;
Zhou, Lu ;
He, Debiao .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2020, 69 (06) :5813-5825
[5]   Blockchain based searchable encryption for electronic health record sharing [J].
Chen, Lanxiang ;
Lee, Wai-Kong ;
Chang, Chin-Chen ;
Choo, Kim-Kwang Raymond ;
Zhang, Nan .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2019, 95 (420-429) :420-429
[6]   Server-Aided Public Key Encryption With Keyword Search [J].
Chen, Rongmao ;
Mu, Yi ;
Yang, Guomin ;
Guo, Fuchun ;
Huang, Xinyi ;
Wang, Xiaofen ;
Wang, Yongjun .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2016, 11 (12) :2833-2842
[7]  
Dong Z, 2021, J COMMUN, V42, DOI [10.11959/j.issn.1000-436x.2021130, DOI 10.11959/J.ISSN.1000-436X.2021130]
[8]   Public key encryption with keyword search secure against keyword guessing attacks without random oracle [J].
Fang, Liming ;
Susilo, Willy ;
Ge, Chunpeng ;
Wang, Jiandong .
INFORMATION SCIENCES, 2013, 238 :221-241
[9]   An efficient public-key searchable encryption scheme secure against inside keyword guessing attacks [J].
Huang, Qiong ;
Li, Hongbo .
INFORMATION SCIENCES, 2017, 403 :1-14
[10]  
Islam S.H., 2017, MATH COMP 3 INT C, P3