Certificate-based authenticated encryption with keyword search: Enhanced security model and a concrete construction for Internet of Things

被引:0
作者
Shiraly, Danial [1 ]
Eslami, Ziba [1 ]
Pakniat, Nasrollah [2 ]
机构
[1] Shahid Beheshti Univ, Dept Data & Comp Sci, GC, Tehran, Iran
[2] Iranian Res Inst Informat Sci & Technol IRANDOC, Informat Sci Res Ctr, Tehran, Iran
关键词
Internet of things (IoT); Cloud computing; Searchable public key encryption; Certificate-based cryptography; Authenticated encryption; Keyword guessing attack; PUBLIC-KEY ENCRYPTION; IDENTITY-BASED ENCRYPTION; DESIGNATED TESTER; GUESSING ATTACKS; SCHEME;
D O I
10.1016/j.jisa.2023.103683
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Internet of Things (IoT) devices produce a humongous amount of data frequently stored on cloud servers, and as a result, cryptographic techniques to guarantee the privacy of outsourced data while preserving search ability on servers are becoming indispensable research topics. A prominent example of such topics is the concept of public key authenticated encryption with keyword search (PAEKS). In spite of the large number of PAEKS schemes in the literature, most existing schemes exhibit issues in certificate management, key escrow, or even key distribution. To address these issues, recently, PAEKS schemes in the certificate-based setting have gained attention. To the best of our knowledge, there exist only two Certificate-Based Authenticated Encryption with Keyword Search (CBAEKS) schemes, both presented with rather weak security models based on single keyword challenges. In this paper, we propose an enhanced security model for CBAEKS which captures notions of multi-ciphertext and multi-trapdoor indistinguishability, then proceed to devise a concrete instantiation for a CBAEKS scheme and formally prove its security under our enhanced model. Furthermore, we prove that the existing CBAEKS schemes are insecure under the enhanced security model. Comparisons with related schemes in the literature are also provided to demonstrate that the enhanced security is achieved at some affordable costs.
引用
收藏
页数:11
相关论文
共 37 条
[1]  
Abdalla M, 2005, LECT NOTES COMPUT SC, V3621, P205
[2]  
Boneh D, 2004, LECT NOTES COMPUT SC, V3027, P506
[3]  
Byun JW, 2006, LECT NOTES COMPUT SC, V4165, P75
[4]   A designated tester-based certificateless public key encryption with conjunctive keyword search for cloud-based MIoT in dynamic multi-user environment [J].
Chenam, Venkata Bhikshapathi ;
Ali, Syed Taqi .
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2023, 72
[5]  
Gentry C, 2003, LECT NOTES COMPUT SC, V2656, P272
[6]   Certificateless Public Key Authenticated Encryption With Keyword Search or Industrial Internet of Things [J].
He, Debiao ;
Ma, Mimi ;
Zeadally, Sherali ;
Kumar, Neeraj ;
Liang, Kaitai .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2018, 14 (08) :3618-3627
[7]   An efficient public-key searchable encryption scheme secure against inside keyword guessing attacks [J].
Huang, Qiong ;
Li, Hongbo .
INFORMATION SCIENCES, 2017, 403 :1-14
[8]   Designated-server identity-based authenticated encryption with keyword search for encrypted emails [J].
Li, Hongbo ;
Huang, Qiong ;
Shen, Jian ;
Yang, Guomin ;
Susilo, Willy .
INFORMATION SCIENCES, 2019, 481 :330-343
[9]   Multi-user searchable encryption with a designated server [J].
Li, Zhen ;
Zhao, Minghao ;
Jiang, Han ;
Xu, Qiuliang .
ANNALS OF TELECOMMUNICATIONS, 2017, 72 (9-10) :617-629
[10]   Dual trapdoor identity-based encryption with keyword search [J].
Liu, Jia'nan ;
Lai, Junzuo ;
Huang, Xinyi .
SOFT COMPUTING, 2017, 21 (10) :2599-2607