An improved secure designated server public key searchable encryption scheme with multi-ciphertext indistinguishability

被引:5
作者
Guo, Junling [1 ]
Han, Lidong [1 ,2 ]
Yang, Guang [1 ]
Liu, Xuejiao [1 ,2 ]
Tian, Chengliang [3 ]
机构
[1] Hangzhou Normal Univ, Sch Informat Sci & Technol, Hangzhou, Peoples R China
[2] Hangzhou Normal Univ, Key Lab Cryptog Technol Zhejiang Prov, Hangzhou, Peoples R China
[3] Qingdao Univ, Sch Comp Sci & Technol, Qingdao, Peoples R China
来源
JOURNAL OF CLOUD COMPUTING-ADVANCES SYSTEMS AND APPLICATIONS | 2022年 / 11卷 / 01期
基金
中国国家自然科学基金;
关键词
Searchable encryption; Keyword guessing attack; Multi-ciphertext indistinguishability; Diffie-Hellman problem; Multi-trapdoor privacy; KEYWORD GUESSING ATTACKS; AUTHENTICATED ENCRYPTION; INTERNET; TESTER;
D O I
10.1186/s13677-022-00287-5
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In the cloud, users prefer to store their sensitive data in encrypted form. Searching keywords over encrypted data without loss of data confidentiality is an important issue. In 2004, Boneh et al. proposed the first public-key searchable encryption scheme which allows users to search by the private key. However, most existing public-key searchable encryption schemes are vulnerable to keyword guessing attack and can not satisfy multi-ciphertext indistinguishability. In this paper, we construct a secure designated server public-key searchable encryption based on Diffie-Hellman problem. Our security analysis shows that our proposed scheme can resist against keyword guessing attack and provide multi-ciphertext indistinguishability for any adversity. Furthermore, the proposed scheme can achieve multi-trapdoor privacy for external attackers. Moreover, the simulation results between our scheme and previous schemes demonstrate our new scheme is suitable for practical application.
引用
收藏
页数:12
相关论文
共 35 条
  • [1] Abdalla M, 2005, LECT NOTES COMPUT SC, V3621, P205
  • [2] [Anonymous], 2009, PUBLIC KEY ENCRYPTIO
  • [3] Baek J, 2008, LECT NOTES COMPUT SC, V5072, P1249, DOI 10.1007/978-3-540-69839-5_96
  • [4] Bingjian W., 2011, INT J INF ED TECHNOL, V1, P350
  • [5] Blake F., 2005, ADV ELLIPTIC CURVE C, V317, DOI DOI 10.1017/CBO9780511546570
  • [6] Boneh D, 2004, LECT NOTES COMPUT SC, V3027, P506
  • [7] Byun JW, 2006, LECT NOTES COMPUT SC, V4165, P75
  • [8] Server-Aided Public Key Encryption With Keyword Search
    Chen, Rongmao
    Mu, Yi
    Yang, Guomin
    Guo, Fuchun
    Huang, Xinyi
    Wang, Xiaofen
    Wang, Yongjun
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2016, 11 (12) : 2833 - 2842
  • [9] Dual-Server Public-Key Encryption With Keyword Search for Secure Cloud Storage
    Chen, Rongmao
    Mu, Yi
    Yang, Guomin
    Guo, Fuchun
    Wang, Xiaofen
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2016, 11 (04) : 789 - 798
  • [10] Chen X, 2020, IACR CRYPTOL EPRINT, V2020, P1211