Secure and efficient encrypted keyword search for multi-user setting in cloud computing

被引:7
作者
Wang, Haijiang [1 ]
Dong, Xiaolei [2 ]
Cao, Zhenfu [2 ]
机构
[1] Shanghai Jiao Tong Univ, Dept Comp Sci & Engn, Shanghai 200240, Peoples R China
[2] East China Normal Univ, Shanghai Key Lab Trustworthy Comp, Shanghai 200062, Peoples R China
基金
高等学校博士学科点专项科研基金; 中国国家自然科学基金;
关键词
Asymmetric group key agreement; Searchable encryption; Keyword search; Date sharing; Constant communication overhead;
D O I
10.1007/s12083-017-0622-0
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A key challenge to design searchable encryption in multi-user setting lies in the efficient management of encryption and search keys. Existing multi-user searchable encryption schemes either extend the single-user searchable encryption framework with broadcast encryption or require search user refers to the data owner and get the search token. However, this implies the necessity that the data owner distributes a single shared secret key among the group of users or requires the data owner stay online to authorize other users to search. In this paper, we address this practical problem, which is neglected in the literature. We also study secret-key-recovery attack where a malicious user can deduce a valid secret when given a search token. We show such attack violates secret key privacy, which is important in the whole system. Inspired by asymmetric group key agreement and multilinear map technology, we provide a secure and efficient encrypted keyword search scheme for multi-user setting, in which a data owner can share data with a group users without knowing which user in the group. In the proposed scheme, (a) each user has his own secret key, (b) each user generates trapdoors without getting any help from data owner or the third party, (c) our scheme features constant communication overhead, and (d) our scheme resist the secret-key-recovery attack. Our scheme preserves the traceability inherited from the asymmetric group key agreement system. We offer rigorous security proof of our scheme, and the performance analysis demonstrates the efficiency of our scheme.
引用
收藏
页码:32 / 42
页数:11
相关论文
共 32 条
[1]  
[Anonymous], 2012, NDSS
[2]  
[Anonymous], 2014, PROC NDSS
[3]  
Bao F, 2008, LECT NOTES COMPUT SC, V4991, P71
[4]  
Blake IF, 2005, LONDON MATH SOC LECT, V317, P666
[5]  
Boneh D, 2005, LECT NOTES COMPUT SC, V3621, P258
[6]  
Boneh D, 2004, LECT NOTES COMPUT SC, V3027, P506
[7]  
Boneh D., 2003, Contemporary Mathematics, V324, P71, DOI DOI 10.1090/CONM/324/05731
[8]  
Boyen X, 2006, LECT NOTES COMPUT SC, V4004, P427
[9]   Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data [J].
Cao, Ning ;
Wang, Cong ;
Li, Ming ;
Ren, Kui ;
Lou, Wenjing .
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2014, 25 (01) :222-233
[10]  
Chang YC, 2005, LECT NOTES COMPUT SC, V3531, P442