FEASE: Fast and Expressive Asymmetric Searchable Encryption

被引:0
|
作者
Meng, Long [1 ]
Chen, Liqun [1 ]
Tian, Yangguang [1 ]
Manulis, Mark [2 ]
Liu, Suhui [3 ]
机构
[1] Univ Surrey, Guildford, Surrey, England
[2] Univ Bundeswehr Munchen, Munich, Germany
[3] Southeast Univ, Nanjing, Peoples R China
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Asymmetric Searchable Encryption (ASE) is a promising cryptographic mechanism that enables a semi-trusted cloud server to perform keyword searches over encrypted data for users. To be useful, an ASE scheme must support expressive search queries, which are expressed as conjunction, disjunction, or any Boolean formulas. In this paper, we propose a fast and expressive ASE scheme that is adaptively secure, called FEASE. It requires only 3 pairing operations for searching any conjunctive set of keywords independent of the set size and has linear complexity for encryption and trapdoor algorithms in the number of keywords. FEASE is based on a new fast Anonymous Key-Policy Attribute-Based Encryption (A-KP-ABE) scheme as our first proposal, which is of independent interest. To address optional protection against keyword guessing attacks, we extend FEASE into the first expressive Public-Key Authenticated Encryption with Keyword Search (PAEKS) scheme. We provide implementations and evaluate the performance of all three schemes, while also comparing them with the state of the art. We observe that FEASE outperforms all existing expressive ASE constructions and that our A-KP-ABE scheme offers anonymity with efficiency comparable to the currently fastest yet non-anonymous KP-ABE schemes FAME (ACM CCS 2017) and FABEO (ACM CCS 2022).
引用
收藏
页码:2545 / 2562
页数:18
相关论文
共 50 条
  • [1] Research on Asymmetric Searchable Encryption
    Yu, Zonghua
    Wu, Yudong
    MATERIALS SCIENCE, ENERGY TECHNOLOGY, AND POWER ENGINEERING I, 2017, 1839
  • [2] Cryptanalysis of an Asymmetric Searchable Encryption Scheme
    Zare, Fahimeh
    Mala, Hamid
    2017 14TH INTERNATIONAL ISC (IRANIAN SOCIETY OF CRYPTOLOGY) CONFERENCE ON INFORMATION SECURITY AND CRYPTOLOGY (ISCISC), 2017, : 82 - 85
  • [3] An Improved Asymmetric Searchable Encryption Scheme
    Wu, Qi
    SECURITY, PRIVACY, AND ANONYMITY IN COMPUTATION, COMMUNICATION, AND STORAGE, 2016, 10066 : 39 - 44
  • [4] Asymmetric Searchable Encryption from Inner Product Encryption
    Xiao, Siyu
    Ge, Aijun
    Zhang, Jie
    Ma, Chuangui
    Wang, Xu'an
    ADVANCES ON P2P, PARALLEL, GRID, CLOUD AND INTERNET COMPUTING, 2017, 1 : 123 - 132
  • [5] Fast Searchable Encryption With Tunable Locality
    Demertzis, Ioannis
    Papamanthou, Charalampos
    SIGMOD'17: PROCEEDINGS OF THE 2017 ACM INTERNATIONAL CONFERENCE ON MANAGEMENT OF DATA, 2017, : 1053 - 1067
  • [6] Trapdoor Privacy in Asymmetric Searchable Encryption Schemes
    Arriaga, Afonso
    Tang, Qiang
    Ryan, Peter
    PROGRESS IN CRYPTOLOGY - AFRICACRYPT 2014, 2014, 8469 : 31 - 50
  • [7] Efficient and Provable Security Searchable Asymmetric Encryption in the Cloud
    Zhang, Jianyi
    Song, Chenggen
    Wang, Zhiqiang
    Yang, Tao
    Ma, Wenming
    IEEE ACCESS, 2018, 6 : 68384 - 68393
  • [8] Expressive Ciphertext Policy Attribute-Based Searchable Encryption for Medical Records in Cloud
    Wu, Qing
    Ma, Xujin
    Zhang, Leyou
    Chen, Yanru
    Ma, Xujin (mxj419@126.com), 1600, Femto Technique Co., Ltd. (23): : 461 - 472
  • [9] Fast, Searchable, Symmetric Encryption Scheme Supporting Ranked Search
    He, Wei
    Zhang, Yu
    Li, Yin
    SYMMETRY-BASEL, 2022, 14 (05):
  • [10] Fast, Compact, and Expressive Attribute-Based Encryption
    Tomida, Junichi
    Kawahara, Yuto
    Nishimaki, Ryo
    PUBLIC-KEY CRYPTOGRAPHY - PKC 2020, PT I, 2020, 12110 : 3 - 33