Key-updatable public-key encryption with keyword search (Or: How to realize PEKS with efficient key updates for IoT environments)

被引:0
作者
Hiroaki Anada
Akira Kanaoka
Natsume Matsuzaki
Yohei Watanabe
机构
[1] University of Nagasaki,
[2] Toho-University,undefined
[3] The University of Electro-Communications,undefined
[4] Advanced Institute of National Institute of Advanced Industrial Science and Technology (AIST),undefined
[5] National Institute of Information and Communications Technology (NICT),undefined
来源
International Journal of Information Security | 2020年 / 19卷
关键词
Searchable encryption; Public-key encryption with keyword search; Key updates; IoT environments; Raspberry Pi;
D O I
暂无
中图分类号
学科分类号
摘要
Security and privacy are the key issues for the Internet of Things (IoT) systems. Especially, secure search is an important functionality for cooperation among users’ devices and non-trusted servers. Public-key encryption with keyword search (PEKS) enables us to search encrypted data and is expected to be used between a cloud server and users’ mobile devices or IoT devices. However, those mobile devices might be lost or stolen. For IoT devices, it might be difficult to store keys in a tamper-proof manner due to prohibitive costs. In this paper, we deal with such a key-exposure problem on PEKS and introduce the concept of PEKS with key-updating functionality, which we call key-updatable PEKS (KU-PEKS). Specifically, we propose two models of KU-PEKS: the key-evolution model and the key-insulation model. In the key-evolution model, a pair of public and secret keys can be updated if needed (e.g., the secret key is exposed). In the key-insulation model, the public key remains fixed while the secret key can be updated if needed. The former model makes a construction simple and more efficient than the latter. On the other hand, the latter model is preferable for practical use since a user never updates their public key. We show constructions in each model in a black-box manner. We also give implementation results on Raspberry Pi 3, which can be regarded as a reasonable platform of IoT devices.
引用
收藏
页码:15 / 38
页数:23
相关论文
共 18 条
  • [1] Abdalla M(2008)Searchable encryption revisited: consistency properties, relation to anonymous IBE, and extensions J. Cryptol. 21 350-391
  • [2] Bellare M(2008)Provably secure timed-release public key encryption ACM Trans. Inf. Syst. Secur. 11 4:1-4:44
  • [3] Catalano D(2007)Identity-based proxy re-encryption ACNS 2007 288-306
  • [4] Kiltz E(2018)Identity-based encryption with hierarchical key-insulation in the standard model Des. Codes Cryptogr. 87 1005-1033
  • [5] Kohno T(undefined)undefined undefined undefined undefined-undefined
  • [6] Lange T(undefined)undefined undefined undefined undefined-undefined
  • [7] Malone-Lee J(undefined)undefined undefined undefined undefined-undefined
  • [8] Neven G(undefined)undefined undefined undefined undefined-undefined
  • [9] Paillier P(undefined)undefined undefined undefined undefined-undefined
  • [10] Shi H(undefined)undefined undefined undefined undefined-undefined