A sustainable certificateless authenticated searchable encryption with multi-trapdoor indistinguishability

被引:0
作者
Senouci, Mohammed Raouf [1 ]
Benkhaddra, Ilyas [2 ]
Senouci, Abdelkader [3 ]
Li, Fagen [1 ]
机构
[1] Univ Elect Sci & Technol China, Sch Comp Sci & Engn, Chengdu 611731, Peoples R China
[2] Univ Elect Sci & Technol China, Sch Informat & Software Engn, Chengdu 611731, Peoples R China
[3] Northumbria Univ, Fac Engn & Environm, Newcastle Upon Tyne, England
关键词
Authenticated searchable encryption; Multi-trapdoor indistinguishability; Keyword guessing attack; Certificateless encryption; Bilinear pairing; PUBLIC-KEY ENCRYPTION; KEYWORD GUESSING ATTACKS; SCHEME; SECURITY; INTERNET;
D O I
10.1007/s11235-024-01121-w
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Nowadays, users often opt to encrypt their sensitive data before outsourcing it to the cloud. While this encryption ensures data privacy, it compromises the search functionality. Public key encryption with keyword search (PEKS) has been posited as a potential solution to this challenge. However, many PEKS schemes are either inefficient or vulnerable to various types of attacks, such as inside keyword guessing attacks, outside keyword guessing attacks, etc. In response, we introduce a sustainable certificateless authenticated encryption system with a keyword search scheme. To the best of our knowledge, this proposed scheme is the first to consider multi-trapdoor indistinguishability within the certificateless primitive. Furthermore, our in-depth security analysis indicates that our scheme effectively protects against both online and offline keyword guessing attacksAdditionally, it ensures semantic security by offering both ciphertext indistinguishability and multi-trapdoor indistinguishability. Performance analysis results also suggest that our scheme is efficient and superior to existing alternatives.
引用
收藏
页码:213 / 227
页数:15
相关论文
共 50 条
[31]   Public key authenticated searchable encryption against frequency analysis attacks [J].
Cheng, Leixiao ;
Meng, Fei .
INFORMATION SCIENCES, 2023, 640
[32]   Certificateless Deniable Authenticated Encryption for Location-Based Privacy Protection [J].
Chen, Guanhua ;
Zhao, Jianyang ;
Jin, Ying ;
Zhu, Quanyin ;
Jin, Chunhua ;
Shan, Jinsong ;
Zong, Hui .
IEEE ACCESS, 2019, 7 :101704-101717
[33]   Provably CCA-Secure Anonymous Multi-Receiver Certificateless Authenticated Encryption [J].
Tseng, Yi-Fan ;
Fan, Chun-I .
JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2018, 34 (06) :1517-1541
[34]   Efficient certificateless searchable encryption scheme with verifiability [J].
Cui X. ;
Tian Y. ;
Zhang Q. .
Tongxin Xuebao/Journal on Communications, 2023, 44 (08) :61-77
[35]   Multi-user searchable encryption with a designated server [J].
Li, Zhen ;
Zhao, Minghao ;
Jiang, Han ;
Xu, Qiuliang .
ANNALS OF TELECOMMUNICATIONS, 2017, 72 (9-10) :617-629
[36]   Multi-receiver Certificateless Searchable Public Key Encryption Scheme for IoMT [J].
Liu, Xiaoguang ;
Liu, Peize ;
Yang, Bo ;
Chen, Yizhan ;
Wang, Ziqing .
FRONTIERS IN CYBER SECURITY, FCS 2024, PT I, 2024, 2315 :508-526
[37]   Certificateless searchable public key authenticated encryption with designated tester for cloud-assisted medical Internet of Things [J].
Libing Wu ;
Yubo Zhang ;
Mimi Ma ;
Neeraj Kumar ;
Debiao He .
Annals of Telecommunications, 2019, 74 :423-434
[38]   Efficient public key authenticated searchable encryption scheme without bilinear pairings [J].
Huang, Meijuan ;
Gan, Jingjie ;
Yang, Bo ;
Du, Hongzhen ;
Zhao, Yanqi .
COMPUTER STANDARDS & INTERFACES, 2025, 94
[39]   LMCLAEKS: LWE-assisted multi-recipient certificateless authenticated encryption with keyword search [J].
Sun, Liwang ;
Cao, Zhenfu ;
Dong, Xiaolei ;
Shen, Jiachen .
INFORMATION SCIENCES, 2023, 648
[40]   An Attribute-based Searchable Encryption Scheme Supporting Trapdoor Updating [J].
Xu, Jingjing ;
Ying, Chun ;
Tan, Shuhua ;
Sun, Zhe ;
Wang, Pan ;
Sun, Zhixin .
2018 16TH IEEE INT CONF ON DEPENDABLE, AUTONOM AND SECURE COMP, 16TH IEEE INT CONF ON PERVAS INTELLIGENCE AND COMP, 4TH IEEE INT CONF ON BIG DATA INTELLIGENCE AND COMP, 3RD IEEE CYBER SCI AND TECHNOL CONGRESS (DASC/PICOM/DATACOM/CYBERSCITECH), 2018, :7-14