Lattice-Based Key-Aggregate (Searchable) Encryption in Cloud Storage

被引:11
作者
Yao, Yanqing [1 ,3 ]
Zhai, Zhengde [2 ]
Liu, Jianwei [1 ]
Li, Zhoujun [3 ,4 ]
机构
[1] Beihang Univ, Sch Cyberspace Sci & Technol, Key Lab Aerosp Network Secur, Minist Ind & Informat Technol, Beijing 100191, Peoples R China
[2] Ant Financial Serv Grp, Beijing 100020, Peoples R China
[3] Beihang Univ, State Key Lab Software Dev Environm, Beijing 100191, Peoples R China
[4] Shenzhen Univ, Coll Comp Sci & Software Engn, Shenzhen 518060, Peoples R China
基金
北京市自然科学基金;
关键词
Cloud storage; searchable data sharing; key-aggregate encryption; key-aggregate searchable encryption; lattice-based problem; the learning with errors problem; EFFICIENT; SCHEME;
D O I
10.1109/ACCESS.2019.2952163
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In cloud storage, selectively sharing encrypted data is becoming increasingly important. One key design challenge is the management of encryption keys. Traditionally, a large quantity of encryption keys have to be managed by the data owner, and an equally large number of keyword trapdoors must be sent to the cloud for the purpose of searching over the shared data, which are cumbersome in terms of secure communication and management. Recently, key-aggregate (searchable) encryption schemes have been introduced to alleviate the problem. However, they were only designed under the Bilinear Diffie-Hellman Exponent assumption in the prior works. Lattice-based key-aggregate (searchable) encryption schemes are valuable, because they have security against quantum computing attacks, average-case to worse-case equivalence as well as simplicity and potential efficiency. Here we propose a key-aggregate encryption scheme and a key-aggregate searchable encryption scheme which are both based on a lattice problem (i.e., the Learning with Errors problem). Some key techniques are employed during the construction of the schemes. A basis delegation algorithm is designed to generate the aggregate key without increasing the lattice dimension. The encryption algorithms of the two schemes are trickily devised to make the encrypted files decryptable or searchable. To overcome the problem of general matrix multiplication failing to satisfy commutative law, a hash function is designed by using diagonalizable matrices to make the encrypted file decryptable and the trapdoor adjustable.We present the schemes' correctness proof, formal security analysis as well as performance analysis, which confirm that they are provably secure and practically efficient. To the best of our knowledge, the former is the first lattice-based key-aggregate encryption scheme and the latter is the first lattice-based key-aggregate searchable encryption scheme. We also demonstrate their application to cloud storage for searchable group data sharing by combining the two schemes.
引用
收藏
页码:164544 / 164555
页数:12
相关论文
共 50 条
[11]   Key-aggregate searchable encryption under multi-owner setting for group data sharing in the cloud [J].
Li, Tong ;
Liu, Zheli ;
Jia, Chunfu ;
Fu, Zhangjie ;
Li, Jin .
INTERNATIONAL JOURNAL OF WEB AND GRID SERVICES, 2018, 14 (01) :21-43
[12]   MULKASE: a novel approach for key-aggregate searchable encryption for multi-owner data [J].
Mukti Padhya ;
Devesh C. Jinwala .
Frontiers of Information Technology & Electronic Engineering, 2019, 20 :1717-1748
[13]   Verifiable Key-Aggregate Searchable Encryption With a Designated Server in Multi-Owner Setting [J].
Liu, Jinlu ;
Wei, Zhongkai ;
Qin, Jing ;
Zhao, Bo ;
Ma, Jixin .
IEEE TRANSACTIONS ON SERVICES COMPUTING, 2023, 16 (06) :4233-4247
[14]   KAPRE: Key-aggregate proxy re-encryption for secure and flexible data sharing in cloud storage [J].
Pareek, Gaurav ;
Purushothama, B. R. .
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2021, 63
[15]   A secure key-aggregate authentication cryptosystem for data sharing in dynamic cloud storage [J].
Alimohammadi, Kobra ;
Bayat, Majid ;
Javadi, Hamid H. S. .
MULTIMEDIA TOOLS AND APPLICATIONS, 2020, 79 (3-4) :2855-2872
[16]   KASE-AKA: Key-aggregate keyword searchable encryption against keyword guessing attack and authorization abuse [J].
Lan, Caihui ;
Li, Haifeng ;
Wang, Caifen ;
Yang, Xiaodong ;
Yao, Hailong .
COMPUTER STANDARDS & INTERFACES, 2024, 90
[17]   Key-Aggregate Authentication Cryptosystem for Data Sharing in Dynamic Cloud Storage [J].
Guo, Cheng ;
Luo, Ningqi ;
Jie, Yingmo ;
Bhuiyan, Md Zakirul Alam ;
Chen, Yuanfang ;
Alam, Muhammad .
2017 14TH INTERNATIONAL SYMPOSIUM ON PERVASIVE SYSTEMS, ALGORITHMS AND NETWORKS & 2017 11TH INTERNATIONAL CONFERENCE ON FRONTIER OF COMPUTER SCIENCE AND TECHNOLOGY & 2017 THIRD INTERNATIONAL SYMPOSIUM OF CREATIVE COMPUTING (ISPAN-FCST-ISCC), 2017, :242-249
[18]   Key-aggregate authentication cryptosystem for data sharing in dynamic cloud storage [J].
Guo, Cheng ;
Luo, Ningqi ;
Bhuiyan, Md Zakirul Alam ;
Jie, Yingmo ;
Chen, Yuanfang ;
Feng, Bin ;
Alam, Muhammad .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 84 :190-199
[19]   Searchable Public-Key Encryption With Cryptographic Reverse Firewalls for Cloud Storage [J].
Zhou, Yuyang ;
Hu, Zhebin ;
Li, Fagen .
IEEE TRANSACTIONS ON CLOUD COMPUTING, 2023, 11 (01) :383-396
[20]   Lattice-Based Semantic-Aware Searchable Encryption for Internet of Things [J].
Hou, Yingying ;
Yao, Wenbin ;
Li, Xiaoyong ;
Xia, Yamei ;
Wang, Mingqing .
IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (17) :28370-28384