Designated Server Certificateless Deniably Authenticated Encryption With Keyword Search

被引:6
作者
Zhang, Yulei [1 ]
Wen, Long [1 ]
Zhang, Yongjie [2 ]
Wang, Caifen [3 ]
机构
[1] Northwest Normal Univ, Coll Comp Sci & Engn, Lanzhou 730070, Gansu, Peoples R China
[2] Gansu Hlth Vocat Coll, Lanzhou 730000, Gansu, Peoples R China
[3] Shenzhen Technol Univ, Coll Big Data & Internet, Shenzhen 518000, Guangdong, Peoples R China
基金
中国国家自然科学基金;
关键词
Certificateless; designated tester; deniably authenticated; identity privacy; searchable encryption; PUBLIC-KEY ENCRYPTION;
D O I
10.1109/ACCESS.2019.2945813
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In email system, the cryptography technology has been used to defend email secrets, so it is important to search specific encrypted emails on cloud sever without local decryption. The Public key encryption with keyword search (PEKS) might is a suitable way to perform the email ciphertext search. However, most existing PEKS schemes cannot protect the identity privacy of data sender. Deniably authenticated encryption (DAE) technique allows the data sender to deny his/her involvement after the communication. Moreover, the receiver can verify the authenticity of ciphertext in DAE, which assures the identity privacy of data sender. In this paper, so as to solve the above shortages in existing PEKS schemes, we introduce an original scheme called designated server certificateless deniably authenticated encryption with keyword search (dCLDAEKS), where leverages the techniques of DAE and designated server. In dCLDAEKS, data sender authenticates the messages and simultaneously encrypt them. Meanwhile, only designated server has ability to execute search ciphertext operation for receivers. So there is no adversary including the server can launch inside or outside offline KGA. Therefore dCLDAEKS scheme can better protect the identity privacy of data sender. In addition, compared the related schemes in the literature, dCLDAEKS scheme perform less efficient in some procedure, but it can against inside KGA and better protect the sender's identity privacy.
引用
收藏
页码:146542 / 146551
页数:10
相关论文
共 24 条
[1]   Certificateless deniably authenticated encryption and its application to e-voting system [J].
Ahene, Emmanuel ;
Jin, Chunhua ;
Li, Fagen .
TELECOMMUNICATION SYSTEMS, 2019, 70 (03) :417-434
[2]  
Baek J, 2008, LECT NOTES COMPUT SC, V5072, P1249, DOI 10.1007/978-3-540-69839-5_96
[3]  
Boneh D, 2004, LECT NOTES COMPUT SC, V3027, P506
[4]  
Byun JW, 2006, LECT NOTES COMPUT SC, V4165, P75
[5]   Generic constructions of secure-channel free searchable encryption with adaptive security [J].
Emura, Keita ;
Miyaji, Atsuko ;
Rahman, Mohammad Shahriar ;
Omote, Kazumasa .
SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (08) :1547-1560
[6]   Enabling Central Keyword-Based Semantic Extension Search Over Encrypted Outsourced Data [J].
Fu, Zhangjie ;
Wu, Xinle ;
Wang, Qian ;
Ren, Kui .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2017, 12 (12) :2986-2997
[7]   Toward Efficient Multi-Keyword Fuzzy Search Over Encrypted Outsourced Data With Accuracy Improvement [J].
Fu, Zhangjie ;
Wu, Xinle ;
Guan, Chaowen ;
Sun, Xingming ;
Ren, Kui .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2016, 11 (12) :2706-2716
[8]   Certificateless Public Key Authenticated Encryption With Keyword Search or Industrial Internet of Things [J].
He, Debiao ;
Ma, Mimi ;
Zeadally, Sherali ;
Kumar, Neeraj ;
Liang, Kaitai .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2018, 14 (08) :3618-3627
[9]   An efficient public-key searchable encryption scheme secure against inside keyword guessing attacks [J].
Huang, Qiong ;
Li, Hongbo .
INFORMATION SCIENCES, 2017, 403 :1-14
[10]   Efficient Deniably Authenticated Encryption and Its Application to E-Mail [J].
Li, Fagen ;
Zhong, Di ;
Takagi, Tsuyoshi .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2016, 11 (11) :2477-2486