A Generic Construction of Integrated Secure-Channel Free PEKS and PKE

被引:3
作者
Suzuki, Tatsuya [1 ]
Emura, Keita [2 ]
Ohigashi, Toshihiro [1 ]
机构
[1] Tokai Univ, Minato Ku, 2-3-23 Takanawa, Tokyo 1088619, Japan
[2] Natl Inst Informat & Commun Technol, 4-2-1 Nukui Kitamachi, Koganei, Tokyo 1848795, Japan
来源
INFORMATION SECURITY PRACTICE AND EXPERIENCE (ISPEC 2018) | 2018年 / 11125卷
关键词
PEKS; Integration of PEKS and PKE; Secure-channel free; Joint CCA security; PUBLIC-KEY ENCRYPTION; CHOSEN-CIPHERTEXT SECURITY; IDENTITY-BASED ENCRYPTION; KEYWORD SEARCH;
D O I
10.1007/978-3-319-99807-7_5
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
To provide a search functionality for encrypted data, public key encryption with keyword search (PEKS) has been widely recognized. In actual usage, a PEKS scheme should be employed with a PKE scheme since PEKS itself does not support the decryption of data. Since a naive composition of a PEKS ciphertext and a PKE ciphertext does not provide CCA security, several attempts have been made to integrate PEKS and PKE in a joint CCA manner (PEKS/PKE for short). In this paper, we further extend these works by integrating secure-channel free PEKS (SCF-PEKS) and PKE, which we call SCF-PEKS/PKE, where no secure channel is required to send trapdoors. We give a formal security definition of SCF-PEKS/PKE in a joint CCA manner, and propose a generic construction of SCF-PEKS/PKE based on anonymous identity-based encryption, tag-based encryption, and one-time signature. We also strengthen the current consistency definition according to the secure-channel free property, and show that our construction is strongly consistent if the underlying IBE provides unrestricted strong collision-freeness which is defined in this paper. Finally, we show that such an IBE scheme can be constructed by employing the Abdalla et al. transformations (TCC 2010/JoC 2018).
引用
收藏
页码:69 / 86
页数:18
相关论文
共 29 条
  • [1] Searchable encryption revisited: Consistency properties, relation to anonymous IBE, and extensions
    Abdalla, Michel
    Bellare, Mihir
    Catalano, Dario
    Kiltz, Eike
    Kohno, Tadayoshi
    Lange, Tanja
    Malone-Lee, John
    Neven, Gregory
    Paillier, Pascal
    Shi, Haixia
    [J]. JOURNAL OF CRYPTOLOGY, 2008, 21 (03) : 350 - 391
  • [2] Robust Encryption
    Abdalla, Michel
    Bellare, Mihir
    Neven, Gregory
    [J]. JOURNAL OF CRYPTOLOGY, 2018, 31 (02) : 307 - 350
  • [3] Abdalla M, 2010, LECT NOTES COMPUT SC, V5978, P480, DOI 10.1007/978-3-642-11799-2_28
  • [4] [Anonymous], 2013, PAIRING BASED CRYPTO
  • [5] [Anonymous], 2008, IACR CRYPTOL EPRINT
  • [6] Baek J, 2006, LECT NOTES COMPUT SC, V4176, P217
  • [7] Bellare M, 2007, LECT NOTES COMPUT SC, V4450, P201
  • [8] Boneh D, 2004, LECT NOTES COMPUT SC, V3027, P506
  • [9] Boneh D., 2001, Advances in Cryptology - CRTPTO 2001. 21st Annual International Cryptology Conference, Proceedings (Lecture Notes in Computer Science Vol.2139), P213
  • [10] Boyen X, 2006, LECT NOTES COMPUT SC, V4117, P290