Lightweight searchable encryption scheme based on certificateless cryptosystem

被引:4
|
作者
Yang, Xiaodong [1 ]
Chen, Guilan [1 ]
Wang, Meiding [1 ]
Pei, Xizhen [1 ]
机构
[1] Northwest Normal Univ, Dept Comp Sci & Engn, Lanzhou, Peoples R China
来源
2019 4TH INTERNATIONAL CONFERENCE ON MECHANICAL, CONTROL AND COMPUTER ENGINEERING (ICMCCE 2019) | 2019年
基金
中国博士后科学基金; 中国国家自然科学基金;
关键词
cloud storage; searchable encryption; certificateless cryptosystem; lightweight; PUBLIC-KEY ENCRYPTION;
D O I
10.1109/ICMCCE48743.2019.00155
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Searchable encryption technology can guarantee the confidentiality of cloud data and the searchability of ciphertext data, which has a very broad application prospect in cloud storage environments. However, most existing searchable encryption schemes have problems, such as excessive computational overhead and low security. In order to solve these problems, a lightweight searchable encryption scheme based on certificateless cryptosystem is proposed. The user's final private key consists of partial private key and secret value, which effectively solves the certificate management problem of the traditional cryptosystem and the key escrow problem of identity-based cryptosystem. At the same time, the introduction of thirdparty manager has significantly reduced the burden in the cloud server and achieved lightweight multi-user ciphertext retrieval. In addition, the data owner stores the file index in the third-party manager, while the file ciphertext is stored in the cloud server. This ensures that the file index is not known by the cloud server. The analysis results show that the scheme satisfies trapdoor indistinguishability and can resist keyword guessing attacks. Compared with similar certificateless encryption schemes, it has higher computational performance in key generation, keyword encryption, trapdoor generation and keyword search.
引用
收藏
页码:669 / 672
页数:4
相关论文
共 50 条
  • [41] A Searchable Encryption Scheme for Encrypted Large Data Sets
    Jia Q.
    Zhang S.
    Zhou F.-C.
    Dongbei Daxue Xuebao/Journal of Northeastern University, 2019, 40 (07): : 913 - 919
  • [42] Attribute-Based Searchable Encryption in Edge Computing for Lightweight Devices
    Niu, Shufen
    Hu, Ying
    Zhou, Siwei
    Shao, Honglin
    Wang, Caifen
    IEEE SYSTEMS JOURNAL, 2023, 17 (03): : 3503 - 3514
  • [43] A time-aware searchable encryption scheme for EHRs
    Zhou, Yousheng
    Zhao, Xiaofeng
    Liu, Siling
    Long, Xingwang
    Luo, Wenjun
    DIGITAL COMMUNICATIONS AND NETWORKS, 2019, 5 (03) : 170 - 175
  • [44] Delegate Searchable Encryption Scheme Resisting Keyword Guess
    Cao Suzhen
    Lang Xiaoli
    Liu Xiangzhen
    Zhang Yulei
    Wang Fei
    JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY, 2019, 41 (09) : 2180 - 2186
  • [45] Keyword Searchable Encryption Scheme based on Blockchain in Cloud Environment
    Yang, Yanyan
    Hu, Mingsheng
    Cheng, Yage
    Liu, Xinxin
    Ma, Wei
    2020 3RD INTERNATIONAL CONFERENCE ON SMART BLOCKCHAIN (SMARTBLOCK), 2020, : 29 - 32
  • [46] Searchable Encryption Scheme for Personalized Privacy in IoT-Based Big Data
    Li, Shuai
    Li, Miao
    Xu, Haitao
    Zhou, Xianwei
    SENSORS, 2019, 19 (05)
  • [47] A lattice-based searchable encryption scheme with the validity period control of files
    Zhang, En
    Hou, Yingying
    Li, Gongli
    MULTIMEDIA TOOLS AND APPLICATIONS, 2021, 80 (03) : 4655 - 4672
  • [48] Searchable Encryption Scheme of Genomic Data Based on Suffix Tree
    Qin S.-Y.
    Zhou F.-C.
    Liu L.
    Dongbei Daxue Xuebao/Journal of Northeastern University, 2019, 40 (04): : 461 - 466
  • [49] A sustainable certificateless authenticated searchable encryption with multi-trapdoor indistinguishability
    Senouci, Mohammed Raouf
    Benkhaddra, Ilyas
    Senouci, Abdelkader
    Li, Fagen
    TELECOMMUNICATION SYSTEMS, 2024, 86 (01) : 213 - 227
  • [50] A Multi-users Searchable Encryption Scheme with Proxy Re-encryption
    Zhang Ya-ling
    Liu Kai
    Wang Shang-ping
    Sun Qin-dong
    2014 TENTH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS), 2014, : 563 - 567