Post-Quantum Public-Key Authenticated Searchable Encryption with Forward Security: General Construction, and Applications

被引:0
|
作者
Xu, Shiyuan [1 ]
Cao, Yibo [2 ]
Chen, Xue [1 ,3 ]
Zhao, Yanmin [1 ]
Yiu, Siu-Ming [1 ]
机构
[1] Univ Hong Kong, Dept Comp Sci, Pok Fu Lam, Hong Kong, Peoples R China
[2] Beijing Univ Posts & Telecommun, Sch Cyberspace Secur, Beijing, Peoples R China
[3] Hong Kong Polytech Univ, Dept Comp, Hung Hom, Hong Kong, Peoples R China
关键词
Public-key authenticated encryption with keyword search; Lattice; Forward security; Multi-ciphertext indistinguishability; Trapdoor privacy; Generic construction; KEYWORD SEARCH; DISCRETE LOGARITHMS; ALGORITHMS;
D O I
10.1007/978-981-97-0942-7_14
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Public-key encryption with keyword search (PEKS) was first proposed by Boneh et al. (EUROCRYPT 2004), achieving the ability to search for ciphertext files. Nevertheless, it is vulnerable to inside keyword guessing attacks (IKGA). Public-key authenticated encryption with keyword search (PAEKS), introduced by Huang et al. (Inf. Sci. 2017), on the other hand, is secure against IKGA. Nonetheless, it is susceptible to quantum computing attacks. Liu et al. and Cheng et al. addressed this problem by reducing to the lattice hardness (AsiaCCS 2022, ESORICS 2022). Furthermore, several scholars pointed out that the threat of secret key exposure delegates a severe and realistic concern, potentially leading to privacy disclosure (EUROCRYPT 2003, Compt. J. 2022). As a result, research focusing on mitigating key exposure and resisting quantum attacks for the PAEKS primitive is far-reaching. In this work, we present the first generic construction and instantiation of forward-secure PAEKS primitive based on lattice hardness without trusted authorities, mitigating the secret key exposure while ensuring quantum-safe properties. We extend the scheme of Liu et al. (AsiaCCS 2022), and formalize a novel post-quantum PAEKS construction, namely FS-PAEKS. To begin with, we introduce the binary tree structure to represent the time periods, along with a lattice basis extension algorithm, and SamplePre algorithm to obtain the post-quantum one-way secret key evolution, allowing users to update their secret keys periodically. Furthermore, our scheme is proven to be IND-CKA and IND-IKGA secure in a quantum setting. In addition, we also compare the security of our primitive in terms of computational complexity and communication overhead with other top-tier schemes. Ultimately, we demonstrate two potential applications of FS-PAEKS.
引用
收藏
页码:274 / 298
页数:25
相关论文
共 50 条
  • [1] Security-enhanced public-key authenticated searchable encryption
    Cheng, Leixiao
    Qin, Jing
    Feng, Feng
    Meng, Fei
    [J]. INFORMATION SCIENCES, 2023, 647
  • [2] Post-Quantum Security Models for Authenticated Encryption
    Soukharev, Vladimir
    Jao, David
    Seshadri, Srinath
    [J]. POST-QUANTUM CRYPTOGRAPHY, PQCRYPTO 2016, 2016, 9606 : 64 - 78
  • [3] On the Post-quantum Security of Classical Authenticated Encryption Schemes
    Lang, Nathalie
    Lucks, Stefan
    [J]. PROGRESS IN CRYPTOLOGY - AFRICACRYPT 2023, 2023, 14064 : 79 - 104
  • [4] Certificateless Public Key Authenticated Searchable Encryption With Enhanced Security Model in IIoT Applications
    Cheng, Leixiao
    Meng, Fei
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2023, 10 (02): : 1391 - 1400
  • [5] Round5: Compact and Fast Post-quantum Public-Key Encryption
    Baan, Hayo
    Bhattacharya, Sauvik
    Fluhrer, Scott
    Garcia-Morchon, Oscar
    Laarhoven, Thijs
    Rietman, Ronald
    Saarinen, Markku-Juhani O.
    Tolhuizen, Ludo
    Zhang, Zhenfei
    [J]. POST-QUANTUM CRYPTOGRAPHY, PQCRYPTO 2019, 2019, 11505 : 83 - 102
  • [6] Towards Post-Quantum Key-Updatable Public-Key Encryption via Supersingular Isogenies
    Eaton, Edward
    Jao, David
    Komlo, Chelsea
    Mokrani, Youcef
    [J]. SELECTED AREAS IN CRYPTOGRAPHY, 2022, 13203 : 461 - 482
  • [7] Generic Construction of Public-key Authenticated Encryption with Keyword Search Revisited: Stronger Security and Efficient Construction
    Emura, Keita
    [J]. APKC'22: PROCEEDINGS OF THE 9TH ACM ASIA PUBLIC-KEY CRYPTOGRAPHY WORKSHOP, 2022, : 39 - 49
  • [8] Forward Secure Public-key Authenticated Encryption with Conjunctive Keyword Search
    JIANG, Z. H. E.
    ZHANG, K. A., I
    WANG, L. I. A. N. G. L. I. A. N. G.
    NING, J. I. A. N. T. I. N. G.
    [J]. COMPUTER JOURNAL, 2023, 66 (09): : 2265 - 2278
  • [9] Trapdoor security in a searchable public-key encryption scheme with a designated tester
    Rhee, Hyun Sook
    Park, Jong Hwan
    Susilo, Willy
    Lee, Dong Hoon
    [J]. JOURNAL OF SYSTEMS AND SOFTWARE, 2010, 83 (05) : 763 - 771
  • [10] Enhancing the Security of Classical Communication with Post-Quantum Authenticated-Encryption Schemes for the Quantum Key Distribution
    Ghashghaei, Farshad Rahimi
    Ahmed, Yussuf
    Elmrabit, Nebrase
    Yousefi, Mehdi
    [J]. COMPUTERS, 2024, 13 (07)