Key-Aggregate Searchable Encryption, Revisited: Formal Foundations for Cloud Applications, and Their Implementation

被引:6
作者
Kamimura, Masahiro [1 ]
Yanai, Naoto [1 ]
Okamura, Shingo [2 ]
Cruz, Jason Paul [1 ]
机构
[1] Osaka Univ, Grad Sch Informat Sci & Technol, Suita, Osaka 5650871, Japan
[2] Nara Coll, Natl Inst Technol, Nara 6391080, Japan
来源
IEEE ACCESS | 2020年 / 8卷
基金
日本学术振兴会;
关键词
Key-aggregate searchable encryption; searchable encryption; data sharing; provable security; KEYWORD SEARCH; PRIVACY; SCHEME;
D O I
10.1109/ACCESS.2020.2967793
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In the use of a cloud storage, sharing of data with efficient access control is an important requirement in addition to data security and privacy. Cui et al. (IEEE Trans. on Comp. 2016) proposed <italic>key-aggregate searchable encryption (KASE)</italic>, which allows a data owner to issue an <italic>aggregate key</italic> that enables a user to search in an authorized subset of encrypted files by generating an encrypted keyword called <italic>trapdoor</italic>. While the idea of KASE is elegant, to the best of our knowledge, its security has never been discussed formally. In this paper, we discuss the security of KASE formally and propose provably secure schemes. We first introduce our provably secure scheme, named <italic>first construction</italic>, with respect to encrypted files and aggregate keys in a single-server setting. In comparison with the scheme of Cui et al., the first construction is secure without increased computational costs. Then, we introduce another provably secure scheme, named <italic>main construction</italic>, with respect to trapdoors in a two-server setting. The main construction guarantees the privacy of a search, encrypted files, and aggregate keys. Considering 5,000 encrypted keywords, the first construction can finish search within three seconds and the main construction can finish search within six seconds.
引用
收藏
页码:24153 / 24169
页数:17
相关论文
共 50 条
[31]   Away from Theory: A Cloud Storage Application with Public Key Searchable Encryption Feature [J].
Senouci, Mohammed Raouf ;
Senouci, Abdelkader ;
Li, Fagen ;
Busawon, Kumar K. .
PROCEEDINGS OF NINTH INTERNATIONAL CONGRESS ON INFORMATION AND COMMUNICATION TECHNOLOGY, VOL 5, ICICT 2024, 2024, 1000 :81-92
[32]   Provably secure key-aggregate cryptosystems with auxiliary inputs for data sharing on the cloud [J].
Wang, Zhiwei .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2019, 93 :770-776
[33]   A secure key-aggregate authentication cryptosystem for data sharing in dynamic cloud storage [J].
Kobra Alimohammadi ;
Majid Bayat ;
Hamid H. S. Javadi .
Multimedia Tools and Applications, 2020, 79 :2855-2872
[34]   Secure Sharing of Personal Health Records on Cloud Using Key-Aggregate Cryptosystem [J].
Solapurkar, Prajakta .
2015 IEEE INTERNATIONAL CONFERENCE ON INFORMATION PROCESSING (ICIP), 2015, :278-283
[35]   Implementation of searchable symmetric encryption for privacy-preserving keyword search on cloud storage [J].
Salam, Md Iftekhar ;
Yau, Wei-Chuen ;
Chin, Ji-Jian ;
Heng, Swee-Huay ;
Ling, Huo-Chong ;
Phan, Raphael C-W ;
Sen Poh, Geong ;
Tan, Syh-Yuan ;
Yap, Wun-She .
HUMAN-CENTRIC COMPUTING AND INFORMATION SCIENCES, 2015, 5
[36]   Efficient public key encryption with user-friendly keywords search for searchable cloud storage [J].
Chen, Kuo-Chang ;
Chen, Yu-Chi ;
Horng, Gwoboa ;
Tso, Raylin .
INTELLIGENT SYSTEMS AND APPLICATIONS (ICS 2014), 2015, 274 :724-733
[37]   A Secure Data Sharing Based on Key Aggregate Searchable Encryption in Fog-Enabled IoT Environment [J].
Oh, Jihyeon ;
Lee, JoonYoung ;
Kim, MyeongHyun ;
Park, Youngho ;
Park, KiSung ;
Noh, SungKee .
IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, 2022, 9 (06) :4468-4481
[38]   Certificateless Public Key Authenticated Searchable Encryption With Enhanced Security Model in IIoT Applications [J].
Cheng, Leixiao ;
Meng, Fei .
IEEE INTERNET OF THINGS JOURNAL, 2023, 10 (02) :1391-1400
[39]   Multi-server Key Aggregation Searchable Encryption Scheme in Cloud Environment [J].
Zhang Yulei ;
Liu Xiangzhen ;
Lang Xiaoli ;
Zhang Yongjie ;
Chen Wenjuan ;
Wang Caifen .
JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY, 2019, 41 (03) :674-679
[40]   A Searchable Asymmetric Encryption Scheme with Support for Boolean Queries for Cloud Applications [J].
Zeng, Ming ;
Zhang, Kai ;
Qian, Haifeng ;
Chen, Xiaofeng ;
Chen, Jie .
COMPUTER JOURNAL, 2019, 62 (04) :563-578