Constructing pairing-free certificateless public key encryption with keyword search

被引:18
作者
Lu, Yang [1 ]
Li, Ji-guo [1 ]
机构
[1] Hohai Univ, Coll Comp & Informat, Nanjing 211100, Jiangsu, Peoples R China
基金
中国国家自然科学基金;
关键词
Searchable public key encryption; Certificateless public key encryption with keyword search; Bilinear pairing; Computational Diffie-Hellman problem; TP309; IDENTITY-BASED ENCRYPTION; SECURITY; SCHEME; SERVER;
D O I
10.1631/FITEE.1700534
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Searchable public key encryption enables a storage server to retrieve the publicly encrypted data without revealing the original data contents. It offers a perfect cryptographic solution to encrypted data retrieval in encrypted data storage systems. Certificateless cryptography (CLC) is a novel cryptographic primitive that has many merits. It overcomes the key escrow problem in identity-based cryptosystems and the cumbersome certificate problem in conventional public key cryptosystems. Motivated by the appealing features of CLC, three certificateless encryption with keyword search (CLEKS) schemes were presented in the literature. However, all of them were constructed with the costly bilinear pairing and thus are not suitable for the devices that have limited computing resources and battery power. So, it is interesting and worthwhile to design a CLEKS scheme without using bilinear pairing. In this study, we put forward a pairing-free CLEKS scheme that does not exploit bilinear pairing. We strictly prove that the scheme achieves keyword ciphertext indistinguishability against adaptive chosen-keyword attacks under the complexity assumption of the computational Diffie-Hellman problem in the random oracle model. Efficiency comparison and the simulation show that it enjoys better performance than the previous pairing-based CLEKS schemes. In addition, we briefly introduce three extensions of the proposed CLEKS scheme.
引用
收藏
页码:1049 / 1060
页数:12
相关论文
共 39 条
  • [1] Searchable encryption revisited: Consistency properties, relation to anonymous IBE, and extensions
    Abdalla, Michel
    Bellare, Mihir
    Catalano, Dario
    Kiltz, Eike
    Kohno, Tadayoshi
    Lange, Tanja
    Malone-Lee, John
    Neven, Gregory
    Paillier, Pascal
    Shi, Haixia
    [J]. JOURNAL OF CRYPTOLOGY, 2008, 21 (03) : 350 - 391
  • [2] Al-Riyami SS, 2003, LECT NOTES COMPUT SC, V2894, P452
  • [3] [Anonymous], 1993, ACM CCS 1993, DOI DOI 10.1145/168588.168596
  • [4] [Anonymous], 2012, MIRACL CRYPT SDK MUL
  • [5] [Anonymous], 2015, INT C NETW SYST SEC
  • [6] [Anonymous], 2017, INT J COMMUNICATION
  • [7] [Anonymous], 2000, SEC 2 REC ELL CURV D
  • [8] Baek J, 2008, LECT NOTES COMPUT SC, V5072, P1249, DOI 10.1007/978-3-540-69839-5_96
  • [9] Boneh D, 2004, LECT NOTES COMPUT SC, V3027, P506
  • [10] The random oracle methodology, revisited
    Canetti, R
    Goldreich, O
    Halevi, S
    [J]. JOURNAL OF THE ACM, 2004, 51 (04) : 557 - 594