An efficient public-key searchable encryption scheme secure against inside keyword guessing attacks

被引:256
作者
Huang, Qiong [1 ,2 ]
Li, Hongbo [1 ]
机构
[1] South China Agr Univ, Coll Math & Informat, Guangzhou 510642, Guangdong, Peoples R China
[2] Nanjing Univ Informat Sci & Technol, Nanjing, Jiangsu, Peoples R China
基金
中国国家自然科学基金;
关键词
Public key authenticated encryption with keyword search; Searchable encryption; Keyword guessing attack; Random oracle model; RANKED SEARCH; CLOUD DATA; SERVER;
D O I
10.1016/j.ins.2017.03.038
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
How to efficiently search over encrypted data is an important and interesting problem in the cloud era. To solve it, Boneh et al. introduced the notion of public key encryption with keyword search (PEKS), in 2004. However, in almost all the PEKS schemes an inside adversary may recover the keyword from a given trapdoor by exhaustively guessing the keywords offline. How to resist the inside keyword guessing attack in PEKS remains a hard problem. In this paper we propose introduce the notion of Public-key Authenticated Encryption with Keyword Search (PAEKS) to solve the problem, in which the data sender not only encrypts a keyword, but also authenticates it, so that a verifier would be convinced that the encrypted keyword can only be generated by the sender. We propose a concrete and efficient construction of PAEKS, and prove its security based on simple and static assumptions in the random oracle model under the given security models. Experimental results show that our scheme enjoys a comparable efficiency with Boneh et al.'s scheme. (C) 2017 Elsevier Inc. All rights reserved.
引用
收藏
页码:1 / 14
页数:14
相关论文
共 42 条
[1]  
Arriaga A., 2014, TRAPDOOR PRIVACY ASY
[2]  
Arriaga A., 2013, IACR CRYPTOLOGY EPRI, V2013
[3]  
Baek J., 2006, INTEGRATION PUBLIC K
[4]  
Baek J, 2008, LECT NOTES COMPUT SC, V5072, P1249, DOI 10.1007/978-3-540-69839-5_96
[5]  
Bao F, 2003, LECT NOTES COMPUT SC, V2836, P301
[6]   Short group signatures [J].
Boneh, D ;
Boyen, X ;
Shacham, H .
ADVANCES IN CRYPTOLOGY - CRYPTO 2004, PROCEEDINGS, 2004, 3152 :41-55
[7]  
Boneh D, 2004, LECT NOTES COMPUT SC, V3027, P506
[8]   Identity-based encryption from the Weil pairing [J].
Boneh, D ;
Franklin, M .
SIAM JOURNAL ON COMPUTING, 2003, 32 (03) :586-615
[9]  
Boyen X, 2008, LECT NOTES COMPUT SC, V5209, P39, DOI 10.1007/978-3-540-85538-5_3
[10]   Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data [J].
Cao, Ning ;
Wang, Cong ;
Li, Ming ;
Ren, Kui ;
Lou, Wenjing .
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2014, 25 (01) :222-233