Trapdoor Security Lattice-Based Public-Key Searchable Encryption with a Designated Cloud Server

被引:0
作者
Xiaojun Zhang
Chunxiang Xu
机构
[1] Southwest Petroleum University,School of Computer Science
[2] University of Electronic Science and Technology of China,School of Computer Science and Engineering
来源
Wireless Personal Communications | 2018年 / 100卷
关键词
Cloud storage; Lattice-based; Public-key searchable encryption; Ciphertext indistinguishability; Trapdoor security;
D O I
暂无
中图分类号
学科分类号
摘要
Cloud storage technique has becoming increasingly significant in cloud service platform. Before choosing to outsource sensitive data to the cloud server, most of cloud users need to encrypt the important data ahead of time. Recently, the research on how to efficiently retrieve the encrypted data stored in the cloud server has become a hot research topic. Public-key searchable encryption, as a good candidate method, which enables a cloud server to search on a collection of encrypted data with a trapdoor from a receiver, has attracted more researchers’ attention. In this paper, we propose the frist efficient lattice-based public-key searchable encryption with a designated cloud server, which can resist quantum computers attack. In our scheme, we designate a unique cloud server to test and return the search results, thus can remove the secure channel between the cloud server and the receiver. We have proved that our scheme can achieve ciphertext indistinguishability under the hardness of learning with errors, and can achieve trapdoor security in the random oracle model. Moreover, our scheme is secure against off-line keyword guessing attacks from outside adversary.
引用
收藏
页码:907 / 921
页数:14
相关论文
共 16 条
[1]  
Rhee HS(2010)Trapdoor security in a searchable public-key encryption scheme with a designated tester Journal of Systems and Software 83 763-771
[2]  
Park JH(2012)Generic construction of designated tester public-key encryption with keyword search Information Sciences 205 93-109
[3]  
Susilo W(2012)A new trapdoor-indistinguishable public key encryption with keyword search Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications 3 72-81
[4]  
Lee DH(2014)Efficient searchable identity-based encryption with a designated server Annales des Télécommunications 69 391-402
[5]  
Rhee HS(1997)Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer SIAM Journal on Computing 26 1484-1509
[6]  
Park JH(undefined)undefined undefined undefined undefined-undefined
[7]  
Lee DH(undefined)undefined undefined undefined undefined-undefined
[8]  
Zhao Y(undefined)undefined undefined undefined undefined-undefined
[9]  
Chen X(undefined)undefined undefined undefined undefined-undefined
[10]  
Ma H(undefined)undefined undefined undefined undefined-undefined