Scalable CCA-secure public-key authenticated encryption with keyword search from ideal lattices in cloud computing

被引:13
|
作者
Yao, Lisha [1 ]
Weng, Jian [1 ]
Yang, Anjia [1 ]
Liang, Xiaojian [1 ]
Wu, Zhenghao [1 ]
Jiang, Zike [1 ]
Hou, Lin [1 ]
机构
[1] Jinan Univ, Coll Cyber Secur, Coll Informat Sci & Technol, Guangzhou 510632, Peoples R China
基金
国家重点研发计划; 中国国家自然科学基金;
关键词
Public-key authenticated encryption with; keyword search; Ideal lattices; Ring-LWE; Ring-ISIS; EFFICIENT; IMPLEMENTATION; INTERNET;
D O I
10.1016/j.ins.2022.12.035
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Public-key authenticated encryption with keyword search (PAEKS) is an important cryptographic primitive for realizing effective and confidential searches on encrypted data in cloud computing. Several PAEKS schemes with various appealing functionalities have been proposed in the literature. Nevertheless, most of them are based on the classical numbertheoretic assumptions and are impossible to resist quantum attacks. Their security is only proven against chosen-keyword attacks and is considered insufficient. Fortunately, ringLWE and ring-ISIS problems reduced from the worst-case ideal lattices are believed to be post-quantum secure and could be improved computational efficiency in constructions. In this paper, we propose a scalable PAEKS scheme based on ring-LWE and ring-ISIS by adopting the ring analog of lattice algorithms of both digital signature and searchable encryption schemes, in which signature algorithms are used to authenticate ciphertext, making our PAEKS resistant to insider keyword guessing attacks. The scheme is also proved secure against chosen-ciphertext attacks and token privacy attacks. In addition, we extend the PAEKS scheme to conjunctive keywords and multi-user settings to allow for realistic promotion. We finally implement our schemes and compare them with related counterparts, which shows that our constructions are efficient in practical applications. (c) 2022 Elsevier Inc. All rights reserved.
引用
收藏
页码:777 / 795
页数:19
相关论文
共 50 条
  • [1] Public-Key Anamorphism in (CCA-Secure) Public-Key Encryption and Beyond
    Persiano, Giuseppe
    Phan, Duong Hieu
    Yung, Moti
    ADVANCES IN CRYPTOLOGY - CRYPTO 2024, PT II, 2024, 14921 : 422 - 455
  • [2] Forward Secure Public-key Authenticated Encryption with Conjunctive Keyword Search
    JIANG, Z. H. E.
    ZHANG, K. A., I
    WANG, L. I. A. N. G. L. I. A. N. G.
    NING, J. I. A. N. T. I. N. G.
    COMPUTER JOURNAL, 2023, 66 (09): : 2265 - 2278
  • [3] StopGuess: A framework for public-key authenticated encryption with keyword search
    Xiang, Tao
    Wang, Zhongming
    Chen, Biwen
    Li, Xiaoguo
    Wang, Peng
    Chen, Fei
    COMPUTER STANDARDS & INTERFACES, 2024, 88
  • [4] Public-Key Authenticated Encryption with Keyword Search Without Pairings
    Yang N.
    Zhou Q.
    Xu S.
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2020, 57 (10): : 2125 - 2135
  • [5] A Lightweight Blockchain-based Public-Key Authenticated Encryption with Multi-Keyword Search for Cloud Computing
    Du, Haorui
    Chen, Jianhua
    Lin, Fei
    Peng, Cong
    He, Debiao
    SECURITY AND COMMUNICATION NETWORKS, 2022, 2022
  • [6] An error-tolerant keyword search scheme based on public-key encryption in secure cloud computing
    Bo, Yang
    Zhang, Mingwu
    Du, Jun-Qiang
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2016, 28 (04): : 1083 - 1093
  • [7] iPEKS: Fast and Secure Cloud Data Retrieval from the Public-key Encryption with Keyword Search
    Tseng, Fu-Kuo
    Chen, Rong-Jaye
    Lin, Bao-Shuh Paul
    2013 12TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2013), 2013, : 452 - 458
  • [8] Dual-Server Public-Key Authenticated Encryption with Keyword Search
    Chen, Biwen
    Wu, Libing
    Zeadally, Sherali
    He, Debiao
    IEEE TRANSACTIONS ON CLOUD COMPUTING, 2022, 10 (01) : 322 - 333
  • [9] Pairing-free public-key authenticated encryption with keyword search
    Bai, Lisha
    Yong, Lei
    Chen, Zhixian
    Shao, Jun
    COMPUTER STANDARDS & INTERFACES, 2024, 88
  • [10] A more efficient public-key authenticated encryption scheme with keyword search
    Huang, Qiong
    Huang, Peisen
    Li, Hongbo
    Huang, Jianye
    Lin, Hongyuan
    JOURNAL OF SYSTEMS ARCHITECTURE, 2023, 137