Public key authenticated encryption with field-free subset conjunctive and disjunctive keyword search against keyword guessing attacks

被引:1
作者
Chenam, Venkata Bhikshapathi [1 ,2 ]
Tummala, Suneeth Yadav [1 ]
Ali, Syed Taqi [1 ]
机构
[1] Visvesvaraya Natl Inst Technol, Dept Comp Sci & Engn, Nagpur 440010, Maharashtra, India
[2] VIT AP Univ, Sch Comp Sci & Engn, Amaravati 522237, Andhra Pradesh, India
关键词
Searchable encryption; Public key encryption with keyword search; Public key authenticated encryption with keyword search; Keyword guessing attacks; Conjunctive and disjunctive search; Langrange polynomial; EXTENSION;
D O I
10.1007/s12083-023-01618-2
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Public Key Encryption with Keyword Search ( PEKS) is a promising cryptographic primitive that allows searching over encrypted data in secure data outsourcing services. Initially, several PEKS schemes were developed for conjunctive keyword search, but they relied on certain assumptions regarding keyword fields. To address this limitation, an Efficient Public-Key Encryption with Field-free Conjunctive Keyword Search (PEFCK) scheme was introduced in 2015. PEFCK enables conjunctive keyword search without any specific ordering of the keywords. However, PEFCK is vulnerable to keyword guessing attacks (KGA), which compromise its security. To overcome the KGA vulnerability, we propose a new scheme called Public Key Authenticated Encryption with Field-free Subset Conjunctive and Disjunctive Keyword Search (PAEFSCDKS), which leverages the mathematical concept of Lagrange Polynomials. This scheme incorporates three key features: 1) Sender Authentication: The sender encrypts the keywords using both the receiver's public key and its private key, ensuring sender authenticity and integrity. 2) Secure Channel-free: Unlike traditional approaches, our scheme does not require a secure channel to transfer data from the receiver to the cloud server. This eliminates the need for additional secure communication overhead. 3) Subset Conjunctive and Disjunctive Keyword Search: The receiver can perform queries that involve both subset conjunctive and disjunctive keywords, enabling more flexible and powerful searches. Furthermore, we demonstrate that our proposed scheme achieves provable security under index indistinguishability and trapdoor indistinguishability against both internal and external adversaries. Finally, through performance analysis, we show that our proposed scheme outperforms similar PEKS schemes in terms of both theoretical and experimental evaluations.
引用
收藏
页码:1036 / 1050
页数:15
相关论文
共 36 条
  • [1] Key-updatable public-key encryption with keyword search (Or: How to realize PEKS with efficient key updates for IoT environments)
    Anada, Hiroaki
    Kanaoka, Akira
    Matsuzaki, Natsume
    Watanabe, Yohei
    [J]. INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2020, 19 (01) : 15 - 38
  • [2] Bhikshapathi Chenam Venkata, 2023, Security, Privacy and Data Analytics: Select Proceedings of the 2nd International Conference, ISPDA 2022. Lecture Notes in Electrical Engineering (1049), P359, DOI 10.1007/978-981-99-3569-7_26
  • [3] Short group signatures
    Boneh, D
    Boyen, X
    Shacham, H
    [J]. ADVANCES IN CRYPTOLOGY - CRYPTO 2004, PROCEEDINGS, 2004, 3152 : 41 - 55
  • [4] Boneh D, 2004, LECT NOTES COMPUT SC, V3027, P506
  • [5] Boneh D, 2004, LECT NOTES COMPUT SC, V3027, P223
  • [6] Identity-based encryption from the Weil pairing
    Boneh, D
    Franklin, M
    [J]. SIAM JOURNAL ON COMPUTING, 2003, 32 (03) : 586 - 615
  • [7] Boneh D., 1998, Algorithmic Number Theory. Third International Symposium, ANTS-III. Proceedings, P48, DOI 10.1007/BFb0054851
  • [8] Boneh D, 2007, LECT NOTES COMPUT SC, V4392, P535
  • [9] Byun JW, 2006, LECT NOTES COMPUT SC, V4165, P75
  • [10] Secure and efficient wildcard search over encrypted data
    Chatterjee, Sanjit
    Kesarwani, Manish
    Modi, Jayam
    Mukherjee, Sayantan
    Parshuram Puria, Shravan Kumar
    Shah, Akash
    [J]. INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2021, 20 (02) : 199 - 244