Lattice-based searchable encryption scheme against inside keywords guessing attack

被引:0
|
作者
Yu X. [1 ]
Xu C. [1 ]
Xu L. [1 ]
Wang Y. [2 ]
机构
[1] School of Science, Nanjing University of Science and Technology, Nanjing
[2] School of Information Science, Security and Networks, Japan Advanced Institute of Science and Technology, Ishikawa
来源
Computers, Materials and Continua | 2020年 / 64卷 / 02期
关键词
Guessing attack; Post-quantum secure;
D O I
10.32604/CMC.2020.09680
中图分类号
学科分类号
摘要
To save the local storage, users store the data on the cloud server who offers convenient internet services. To guarantee the data privacy, users encrypt the data before uploading them into the cloud server. Since encryption can reduce the data availability, public-key encryption with keyword search (PEKS) is developed to achieve the retrieval of the encrypted data without decrypting them. However, most PEKS schemes cannot resist quantum computing attack, because the corresponding hardness assumptions are some number theory problems that can be solved efficiently under quantum computers. Besides, the traditional PEKS schemes have an inherent security issue that they cannot resist inside keywords guessing attack (KGA). In this attack, a malicious server can guess the keywords encapsulated in the search token by computing the ciphertext of keywords exhaustively and performing the test between the token and the ciphertext of keywords. In the paper, we propose a lattice-based PEKS scheme that can resist quantum computing attacks. To resist inside KGA, this scheme adopts a lattice-based signature technique into the encryption of keywords to prevent the malicious server from forging a valid ciphertext. Finally, some simulation experiments are conducted to demonstrate the performance of the proposed scheme and some comparison results are further shown with respect to other searchable schemes. © 2020 Tech Science Press. All rights reserved.
引用
收藏
页码:1107 / 1125
页数:18
相关论文
共 50 条
  • [21] Lattice-based Dynamical and Anonymous Broadcast Encryption Scheme
    Wang Fenghe
    Wang Xuan
    Wang Chunxiao
    2015 10TH INTERNATIONAL CONFERENCE ON P2P, PARALLEL, GRID, CLOUD AND INTERNET COMPUTING (3PGCIC), 2015, : 853 - 858
  • [22] A Searchable Encryption Scheme Based on Lattice for Log Systems in Blockchain
    Xu, Gang
    Cao, Yibo
    Xu, Shiyuan
    Liu, Xin
    Chen, Xiu-Bo
    Yu, Yiying
    Wang, Xiaojun
    CMC-COMPUTERS MATERIALS & CONTINUA, 2022, 72 (03): : 5429 - 5441
  • [23] Efficient public-key searchable encryption against inside keyword guessing attacks for cloud storage
    Wu, Axin
    Li, Fagen
    Xin, Xiangjun
    Zhang, Yinghui
    Zhu, Jianhao
    JOURNAL OF SYSTEMS ARCHITECTURE, 2024, 149
  • [24] A Fast Public Key Searchable Encryption Scheme Against Inside Keyword Attacks
    Liu, Can
    Chen, Ningjiang
    Huang, Ruwei
    Xie, Yongsheng
    COMPUTER SUPPORTED COOPERATIVE WORK AND SOCIAL COMPUTING, CHINESECSCW 2019, 2019, 1042 : 50 - 64
  • [25] Certificateless searchable public key encryption scheme secure against keyword guessing attacks for smart healthcare
    Ma, Mimi
    He, Debiao
    Fan, Shuqin
    Feng, Dengguo
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2020, 50 (50)
  • [26] An Efficient Secure Channel Free Searchable Encryption Scheme with Multiple Keywords
    Wang, Tingting
    Au, Man Ho
    Wu, Wei
    NETWORK AND SYSTEM SECURITY, (NSS 2016), 2016, 9955 : 251 - 265
  • [27] Semantic Searchable Encryption Scheme Based on Lattice in Quantum-Era
    Yang, Yang
    Ma, Maode
    JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2016, 32 (02) : 425 - 438
  • [28] A lattice-based multi-authority updatable searchable encryption scheme for serverless architecture with scalable on-demand result processing
    Tang, Bin
    Zhou, Yi-Hua
    Yang, Yu-Guang
    Gong, Bei
    Ning, Zhenhu
    COMPUTER STANDARDS & INTERFACES, 2025, 93
  • [29] Multi-user search on the encrypted multimedia database: lattice-based searchable encryption scheme with time-controlled proxy re-encryption
    Yu, Xiaoling
    Xu, Chungen
    Dou, Bennian
    Wang, Yuntao
    MULTIMEDIA TOOLS AND APPLICATIONS, 2021, 80 (02) : 3193 - 3211
  • [30] Multi-user search on the encrypted multimedia database: lattice-based searchable encryption scheme with time-controlled proxy re-encryption
    Xiaoling Yu
    Chungen Xu
    Bennian Dou
    Yuntao Wang
    Multimedia Tools and Applications, 2021, 80 : 3193 - 3211