A Generic Construction of Integrated Secure-Channel Free PEKS and PKE and its Application to EMRs in Cloud Storage

被引:0
作者
Tatsuya Suzuki
Keita Emura
Toshihiro Ohigashi
机构
[1] Tokai University,
[2] National Institute of Information and Communications Technology (NICT),undefined
来源
Journal of Medical Systems | 2019年 / 43卷
关键词
PEKS; Integration of PEKS and PKE; Secure-channel free; Joint CCA security; Encrypted EMR;
D O I
暂无
中图分类号
学科分类号
摘要
To provide a search functionality for encrypted data, public key encryption with keyword search (PEKS) has been widely recognized. In actual usage, a PEKS scheme should be employed with a PKE scheme since PEKS itself does not support the decryption of data. Since a naive composition of a PEKS ciphertext and a PKE ciphertext does not provide CCA security, several attempts have been made to integrate PEKS and PKE in a joint CCA manner (PEKS/PKE for short). In this paper, we further extend these works by integrating secure-channel free PEKS (SCF-PEKS) and PKE, which we call SCF-PEKS/PKE, where no secure channel is required to send trapdoors. We give a formal security definition of SCF-PEKS/PKE in a joint CCA manner, and propose a generic construction of SCF-PEKS/PKE based on anonymous identity-based encryption, tag-based encryption, and one-time signature. We also strengthen the current consistency definition according to the secure-channel free property, and show that our construction is strongly consistent if the underlying IBE provides unrestricted strong collision-freeness which is defined in this paper. We also show that such an IBE scheme can be constructed by employing the Abdalla et al. transformations (TCC 2010/J. Cryptology 2018). Finally, as an application of SCF-PEKS/PKE, we strengthen the security of encrypted Electronic Medical Record (EMR) system proposed by Guo and Yau (J. Medical Sys. 2015).
引用
收藏
相关论文
共 48 条
  • [1] Abdalla M(2008)Searchable encryption revisited: Consistency properties, relation to anonymous IBE, and extensions J. Cryptol. 21 350-391
  • [2] Bellare M(2018)Robust encryption J. Cryptol. 31 307-350
  • [3] Catalano D(2004)The random oracle methodology, revisited J. ACM 51 557-594
  • [4] Kiltz E(2016)Generic constructions of integrated PKE and PEKS Des. Codes Cryptography 78 493-526
  • [5] Kohno T(2015)Generic constructions of secure-channel free searchable encryption with adaptive security Secur. Commun. Netw. 8 1547-1560
  • [6] Lange T(2013)Public key encryption with keyword search secure against keyword guessing attacks without random oracle Inf. Sci. 238 221-241
  • [7] Malone-Lee J(2015)Efficient secure-channel free public key encryption with keyword search for EMRs in cloud storage J. Med. Syst. 39 11-1156
  • [8] Neven G(2008)Searchable encryption with decryption in the standard model IACR Cryptology ePrint Archive 2008 423-109
  • [9] Paillier P(2017)Shorter quasi-adaptive NIZK proofs for linear subspaces J. Cryptology 30 1116-896
  • [10] Shi H(2013)An enhanced security solution for electronic medical records based on AES hybrid technique with SOAP/XML and SHA-1 J. Med. Syst. 37 9971-undefined