CP-ABSEL: Ciphertext-policy attribute-based searchable encryption from lattice in cloud storage

被引:18
作者
Varri, Uma Sankararao [1 ,2 ]
Pasupuleti, Syam Kumar [2 ]
Kadambari, K. V. [1 ]
机构
[1] Natl Inst Technol, Warangal, Andhra Pradesh, India
[2] Inst Dev & Res Banking Technol, Hyderabad, Telangana, India
关键词
Ciphertext-policy attribute-based searchable encryption; Lattice; Cloud storage; Learning with errors; SERVICE;
D O I
10.1007/s12083-020-01057-3
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Ciphertext-policy attribute-based searchable encryption (CP-ABSE) is widely used in the cloud environment to provide data privacy and fine-grained access control over encrypted data. The existing CP-ABSE schemes are designed based on bilinear pairing hardness assumptions to prove their security. However, these schemes are vulnerable to quantum attacks, i.e., adversaries can break the security of these schemes with the use of quantum computers. To address this issue, in this paper, we propose a novel ciphertext-policy attribute-based searchable encryption from lattice (CP-ABSEL) in cloud storage, since lattice-based cryptography is quantum attacks free. In CP-ABSEL, we adopted learning with errors (LWE) hardness assumption to resist from quantum attacks. Further, CP-ABSEL is indistinguishable against the chosen keyword attack and indistinguishable against chosen plaintext attack. Moreover, CP-ABSEL allows only legitimate users to perform a keyword search over an encrypted index, and unauthorized users cannot get even the ciphertext form of documents. The performance analysis proves that CP-ABSEL is efficient and practical.
引用
收藏
页码:1290 / 1302
页数:13
相关论文
共 37 条
[1]  
Agrawal S, 2010, LECT NOTES COMPUT SC, V6110, P553
[2]  
[Anonymous], 2016, INT C CRYPT MAL
[3]   Lattice-Based Public Key Searchable Encryption from Experimental Perspectives [J].
Behnia, Rouzbeh ;
Ozmen, Muslum Ozgur ;
Yavuz, Attila Altay .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2020, 17 (06) :1269-1282
[4]   Dynamic Searchable Encryption in Very-Large Databases: Data Structures and Implementation [J].
Cash, David ;
Jaeger, Joseph ;
Jarecki, Stanislaw ;
Jutla, Charanjit ;
Krawczyk, Hugo ;
Rosu, Marcel-Catalin ;
Steine, Michael .
21ST ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2014), 2014,
[5]  
Cash D, 2010, LECT NOTES COMPUT SC, V6110, P523
[6]   The Business Intelligence as a Service in the Cloud [J].
Chang, Victor .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2014, 37 :512-534
[7]  
Chen L., 2016, Report on post-quantum cryptography, volume12
[8]   Efficient and Expressive Keyword Search Over Encrypted Data in Cloud [J].
Cui, Hui ;
Wan, Zhiguo ;
Deng, Robert H. ;
Wang, Guilin ;
Li, Yingjiu .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2018, 15 (03) :409-422
[9]   Privacy-Preserving Indexing and Query Processing for Secure Dynamic Cloud Storage [J].
Du, Minxin ;
Wang, Qian ;
He, Meiqi ;
Weng, Jian .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2018, 13 (09) :2320-2332
[10]   An Algebraic Framework for Diffie-Hellman Assumptions [J].
Escala, Alex ;
Herold, Gottfried ;
Kiltz, Eike ;
Rafols, Carla ;
Villar, Jorge .
JOURNAL OF CRYPTOLOGY, 2017, 30 (01) :242-288