Dual-Server Public-Key Encryption With Keyword Search for Secure Cloud Storage

被引:191
作者
Chen, Rongmao [1 ,2 ]
Mu, Yi [1 ]
Yang, Guomin [1 ]
Guo, Fuchun [1 ]
Wang, Xiaofen [1 ,3 ]
机构
[1] Univ Wollongong, Sch Comp & Informat Technol, Ctr Comp & Informat Secur Res, Wollongong, NSW 2522, Australia
[2] Natl Univ Def Technol, Coll Comp, Changsha 410073, Hunan, Peoples R China
[3] Univ Elect Sci & Technol China, Sch Comp Sci & Engn, Big Data Res Ctr, Chengdu 611731, Peoples R China
基金
中国国家自然科学基金;
关键词
Keyword search; secure cloud storage; encryption; inside keyword guessing attack; smooth projective hash function; Diffie-Hellman language; GUESSING ATTACKS; SCHEME;
D O I
10.1109/TIFS.2015.2510822
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Searchable encryption is of increasing interest for protecting the data privacy in secure searchable cloud storage. In this paper, we investigate the security of a well-known cryptographic primitive, namely, public key encryption with keyword search (PEKS) which is very useful in many applications of cloud storage. Unfortunately, it has been shown that the traditional PEKS framework suffers from an inherent insecurity called inside keyword guessing attack (KGA) launched by the malicious server. To address this security vulnerability, we propose a new PEKS framework named dual-server PEKS (DS-PEKS). As another main contribution, we define a new variant of the smooth projective hash functions (SPHFs) referred to as linear and homomorphic SPHF (LH-SPHF). We then show a generic construction of secure DS-PEKS from LH-SPHF. To illustrate the feasibility of our new framework, we provide an efficient instantiation of the general framework from a Decision Diffie-Hellman-based LH-SPHF and show that it can achieve the strong security against inside the KGA.
引用
收藏
页码:789 / 798
页数:10
相关论文
共 23 条
  • [1] Abdalla M, 2005, LECT NOTES COMPUT SC, V3621, P205
  • [2] Agrawal R., 2004, P ACM SIGMOD INT C M, P563
  • [3] [Anonymous], 2004, P NETW DISTR SYST SE
  • [4] Baek J, 2008, LECT NOTES COMPUT SC, V5072, P1249, DOI 10.1007/978-3-540-69839-5_96
  • [5] Baek J, 2006, LECT NOTES COMPUT SC, V4176, P217
  • [6] Boneh D, 2004, LECT NOTES COMPUT SC, V3027, P506
  • [7] Byun JW, 2006, LECT NOTES COMPUT SC, V4165, P75
  • [8] A New General Framework for Secure Public Key Encryption with Keyword Search
    Chen, Rongmao
    Mu, Yi
    Yang, Guomin
    Guo, Fuchun
    Wang, Xiaofen
    [J]. INFORMATION SECURITY AND PRIVACY (ACISP 2015), 2015, 9144 : 59 - 76
  • [9] Cocks C.C., 2001, Lecture Notes in Computer Science, P360, DOI [DOI 10.1007/3-540-45325-3, DOI 10.1007/3-540-45325-332]
  • [10] Cramer R, 2002, LECT NOTES COMPUT SC, V2332, P45