Fast Public Key Searchable Encryption Scheme against Internal Keyword Guessing Attack in Cloud Environment

被引:0
|
作者
Chen N. [1 ,2 ]
Liu C. [1 ]
Huang R. [1 ]
Huang B. [1 ]
机构
[1] School of Computer, Electronics and Information, Guangxi University, Nanning
[2] Guangxi Key Laboratory of Multimedia Communications and Network Technology, Nanning
基金
中国国家自然科学基金;
关键词
Ciphertext search; Inside keyword attack; Inverted index; Public key searchable encryption;
D O I
10.11999/JEIT190963
中图分类号
学科分类号
摘要
With the development of cloud computing, the security and search performance of ciphertext retrieval has become the focus of research. In the traditional encryption schemes, most of them only solve the problem of defending against external keyword guessing attacks but ignore the honest and curious cloud server. In order to improve the security of ciphertext, an inside keyword attack scheme based on inverted index is proposed. Firstly, the private key of the data owner is added to resist the keyword attack of the malicious cloud server when the ciphertext inversion index is built. Secondly, an efficient public key ciphertext search scheme of parallel encryption index structure is introduced to realize the parallel search task of keywords. Compared with the traditional public key searchable encryption, the proposed scheme enhances greatly the security and search efficiency of the search system. © 2021, Science Press. All right reserved.
引用
收藏
页码:467 / 474
页数:7
相关论文
共 20 条
  • [1] LI Jingwei, JIA Chunfu, LIU Zheli, Et al., Survey on the searchable encryption, Journal of Software, 26, 1, pp. 109-128, (2015)
  • [2] SONG D X, WAGNER D, PERRIG A., Practical techniques for searches on encrypted data, 2000 IEEE Symposium on Security and Privacy, pp. 44-55, (2000)
  • [3] LI Shuang, XU Maozhi, Attribute-based public encryption with keyword search, Chinese Journal of Computers, 37, 5, pp. 1017-1024, (2014)
  • [4] BONEH D, DI CRESCENZO G, OSTROVSKY R, Et al., Public key encryption with keyword search, International Conference on the Theory and Applications of Cryptographic Techniques, pp. 506-522, (2004)
  • [5] DONG Xiaolei, ZHOU Jun, CAO Zhenfu, Research advances on secure searchable encryption, Journal of Computer Research and Development, 54, 10, pp. 2107-2120, (2017)
  • [6] FANG Liming, SUSILO W, GE Chunpeng, Et al., Public key encryption with keyword search secure against keyword guessing attacks without random oracle, Information Sciences, 238, pp. 221-241, (2013)
  • [7] SUN Lixue, XU Chunxiang, ZHANG Mingwu, Et al., Secure searchable public key encryption against insider keyword guessing attacks from indistinguishability obfuscation, Science China Information Sciences, 61, 3, (2018)
  • [8] BYUN J W, RHEE H S, PARK H A, Et al., Off-line keyword guessing attacks on recent keyword search schemes over encrypted data, 3rd VLDB Workshop on Secure Data Management, pp. 75-83, (2006)
  • [9] WANG Bing, SONG Wei, LOU Wenjing, Et al., Inverted index based multi-keyword public-key searchable encryption with strong privacy guarantee, 2015 IEEE Conference on Computer Communications, pp. 2092-2100, (2015)
  • [10] PENG Yanguo, CUI Jiangtao, PENG Changgen, Et al., Certificateless public key encryption with keyword search, China Communications, 11, 11, pp. 100-113, (2014)