A sustainable certificateless authenticated searchable encryption with multi-trapdoor indistinguishability

被引:0
作者
Senouci, Mohammed Raouf [1 ]
Benkhaddra, Ilyas [2 ]
Senouci, Abdelkader [3 ]
Li, Fagen [1 ]
机构
[1] Univ Elect Sci & Technol China, Sch Comp Sci & Engn, Chengdu 611731, Peoples R China
[2] Univ Elect Sci & Technol China, Sch Informat & Software Engn, Chengdu 611731, Peoples R China
[3] Northumbria Univ, Fac Engn & Environm, Newcastle Upon Tyne, England
关键词
Authenticated searchable encryption; Multi-trapdoor indistinguishability; Keyword guessing attack; Certificateless encryption; Bilinear pairing; PUBLIC-KEY ENCRYPTION; KEYWORD GUESSING ATTACKS; SCHEME; SECURITY; INTERNET;
D O I
10.1007/s11235-024-01121-w
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Nowadays, users often opt to encrypt their sensitive data before outsourcing it to the cloud. While this encryption ensures data privacy, it compromises the search functionality. Public key encryption with keyword search (PEKS) has been posited as a potential solution to this challenge. However, many PEKS schemes are either inefficient or vulnerable to various types of attacks, such as inside keyword guessing attacks, outside keyword guessing attacks, etc. In response, we introduce a sustainable certificateless authenticated encryption system with a keyword search scheme. To the best of our knowledge, this proposed scheme is the first to consider multi-trapdoor indistinguishability within the certificateless primitive. Furthermore, our in-depth security analysis indicates that our scheme effectively protects against both online and offline keyword guessing attacksAdditionally, it ensures semantic security by offering both ciphertext indistinguishability and multi-trapdoor indistinguishability. Performance analysis results also suggest that our scheme is efficient and superior to existing alternatives.
引用
收藏
页码:213 / 227
页数:15
相关论文
共 50 条
  • [21] Certificateless Public Key Authenticated Searchable Encryption With Enhanced Security Model in IIoT Applications
    Cheng, Leixiao
    Meng, Fei
    IEEE INTERNET OF THINGS JOURNAL, 2023, 10 (02): : 1391 - 1400
  • [22] Certificateless Authentication Searchable Encryption Scheme for Multi-user
    Zhang Yulei
    Wen Long
    Wang Haohao
    Zhang Yongjie
    Wang Caifen
    JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY, 2020, 42 (05) : 1094 - 1101
  • [23] Certificateless Searchable Encryption Scheme in Multi-User Environment
    Feng, Tao
    Si, Jiewen
    CRYPTOGRAPHY, 2022, 6 (04)
  • [24] An improved secure designated server public key searchable encryption scheme with multi-ciphertext indistinguishability
    Guo, Junling
    Han, Lidong
    Yang, Guang
    Liu, Xuejiao
    Tian, Chengliang
    JOURNAL OF CLOUD COMPUTING-ADVANCES SYSTEMS AND APPLICATIONS, 2022, 11 (01):
  • [25] Certificateless searchable public key authenticated encryption with designated tester for cloud-assisted medical Internet of Things
    Wu, Libing
    Zhang, Yubo
    Ma, Mimi
    Kumar, Neeraj
    He, Debiao
    ANNALS OF TELECOMMUNICATIONS, 2019, 74 (7-8) : 423 - 434
  • [26] Secure-Channel Free Certificateless Searchable Public Key Authenticated Encryption with Keyword Search
    Yang, Pan
    Li, Hongbo
    Huang, Jianye
    Zhang, Hao
    Au, Man Ho
    Huang, Qiong
    PROVABLE AND PRACTICAL SECURITY, PROVSEC 2022, 2022, 13600 : 20 - 35
  • [27] Password-authenticated searchable encryption
    Chen, Liqun
    Huang, Kaibin
    Manulis, Mark
    Sekar, Venkkatesh
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2021, 20 (05) : 675 - 693
  • [28] Biometric-Authenticated Searchable Encryption
    Gardham, Daniel
    Manulis, Mark
    Dragan, Constantin Catalin
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY (ACNS 2020), PT II, 2020, 12147 : 40 - 61
  • [29] One Time Trapdoor based Searchable Encryption
    Kaushik, Kulvaibhav
    Varadharajan, Vijayaraghavan
    2017 IEEE INTERNATIONAL CONFERENCE ON CLOUD ENGINEERING (IC2E 2017), 2017, : 167 - 174
  • [30] Keyword Revocable Searchable Encryption with Trapdoor Exposure Resistance and Re-generateability
    Emura, Keita
    Phong, Le Trieu
    Watanabe, Yohei
    2015 IEEE TRUSTCOM/BIGDATASE/ISPA, VOL 1, 2015, : 167 - 174