Verifiable Public-Key Encryption with Keyword Search Secure against Continual Memory Attacks

被引:0
作者
Chengyu Hu
Zhen Li
Pengtao Liu
Rupeng Yang
Shanqing Guo
Hailong Zhang
机构
[1] Shandong University,School of Software Engineering
[2] Anhui University,School of Computer Science and Technology
[3] Shandong University of Finance and Economics,School of Computer Science and Technology
[4] Shandong University of Political Science and Law,School of Information
[5] Shandong University,School of Computer Science and Technology
[6] Chinese Academy of Sciences,State Key Laboratory of Information Security, Institute of Information Engineering
来源
Mobile Networks and Applications | 2021年 / 26卷
关键词
Leakage resilience; Verifiable; PEKS; Continual memory attacks; Keyword guessing attacks;
D O I
暂无
中图分类号
学科分类号
摘要
Public-key encryption with keyword search (PEKS) enables users to search on encrypted data which is applicable to scenario of sharing data in the cloud storage. The existing PEKS schemes fail to verify the returned result from the tester, i.e. they cannot guarantee the correctness and completeness of the result. In this paper, we resolve this problem by constructing a verifiable PEKS scheme which can efficiently verify the completeness of the result and thus the correctness. We also consider the security of verifiable PEKS scheme against a kind of side-channel attacks called the continual memory attacks which allow the adversary to obtain some leakage information of the secret key used in the search trapdoor generation algorithm and can help it break the security of the scheme. We extend our scheme to an enhanced one which remains secure even when the adversary can obtain unbounded total leakage information during the whole lifetime. Moreover, to make it resist keyword guessing attacks, we extend our scheme to one with a designated tester.
引用
收藏
页码:2490 / 2500
页数:10
相关论文
共 94 条
  • [1] Ateniese G(2006)Improved proxy re-encryption schemes with applications to secure distributed storage ACM Trans Inf Syst Secur 9 1-30
  • [2] Fu K(2015)New algorithms for secure outsourcing of large-scale systems of linear equations IEEE Trans Inf Forens Secur 10 69-78
  • [3] Green M(2016)Verifiable computation over large database with incremental updates IEEE Trans Comput 65 3184-3195
  • [4] Hohenberger S(2015)Speks: secure server-designation public key encryption with keyword search against keyword guessing attacks Comput J 58 922-933
  • [5] Chen X(2015)A taxonomic view of cloud computing services Int J Comput Sci Eng 11 17-28
  • [6] Huang X(2018)Privacy-preserving naive bayes classifiers secure against the substitution-then-comparison attack Inform Sci 444 72-88
  • [7] Li J(2016)Public-key encryption with keyword search secure against continual memory attacks Secur Commun Netw 9 1613-1629
  • [8] Ma J(2004)Access control language for multidomain environments IEEE Internet Comput 8 40-50
  • [9] Wong D(2015)Enabling efficient multi-keyword ranked search over encrypted mobile cloud data through blind storage IEEE Transa Emerg Topics Comput 3 127-138
  • [10] Lou W(2018)Personalized search over encrypted data with efficient and secure updates in mobile clouds IEEE Trans Emerg Topics Comput 6 97-109