Designated-tester Identity-Based Authenticated Encryption with Keyword Search with applications in cloud systems

被引:0
|
作者
Shiraly, Danial [1 ]
Eslami, Ziba [1 ]
Pakniat, Nasrollah [2 ]
机构
[1] Shahid Beheshti Univ, Dept Data & Comp Sci, Tehran, Iran
[2] Iranian Res Inst Informat Sci & Technol IRANDOC, Informat Sci Res Dept, Tehran, Iran
关键词
Cloud computing; Searchable encryption; Identity-based encryption; Authenticated encryption; Keyword guessing attack; PUBLIC-KEY ENCRYPTION; ID-BASED ENCRYPTION; SCHEME;
D O I
10.1016/j.sysarc.2024.103183
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The advent of cloud computing has made cloud server outsourcing increasingly popular among data owners. However, the storage of sensitive data on cloud servers engenders serious challenges for the security and privacy of data. Public Key Authenticated Encryption with Keyword Search (PAEKS) is an effective method that protects information confidentiality and supports keyword searches. Identity -Based Authenticated Encryption with Keyword Search (IBAEKS) is a PAEKS variant in identity -based settings, designed for solving the intractable certificate management problem. To the best of our knowledge, only two IBAEKS schemes exist in the literature, both presented with weak security models that make them vulnerable against what is known as Fully Chosen Keyword attacks. Moreover, the existing IBAEKS schemes are based on the time-consuming bilinear pairing operation, leading to a significant increase in computational cost. To overcome these issues, in this paper, we first propose an enhanced security model for IBAEKS and compare it with existing models. We then prove that the existing IBAEKS schemes are not secure in our enhanced model. We also propose an efficient pairing -free dIBAEKS scheme and prove that it is secure under the enhanced security model. Finally, we compare our proposed scheme with related constructions to indicate its overall superiority.
引用
收藏
页数:11
相关论文
共 50 条
  • [1] Designated-server identity-based authenticated encryption with keyword search for encrypted emails
    Li, Hongbo
    Huang, Qiong
    Shen, Jian
    Yang, Guomin
    Susilo, Willy
    INFORMATION SCIENCES, 2019, 481 : 330 - 343
  • [2] Hierarchical Identity-Based Authenticated Encryption with Keyword Search over encrypted cloud data
    Shiraly, Danial
    Eslami, Ziba
    Pakniat, Nasrollah
    JOURNAL OF CLOUD COMPUTING-ADVANCES SYSTEMS AND APPLICATIONS, 2024, 13 (01):
  • [3] dMCLAEKS: Pairing-free designated-tester multi-recipient certificateless authenticated encryption with keyword search for concealing search patterns
    Sun, Liwang
    Cao, Zhenfu
    Dong, Xiaolei
    Shen, Jiachen
    Wang, Miao
    Chen, Jiasheng
    JOURNAL OF SYSTEMS ARCHITECTURE, 2023, 144
  • [4] Efficient designated server identity-based encryption with conjunctive keyword search
    Lu, Yang
    Wang, Gang
    Li, Jiguo
    Shen, Jian
    ANNALS OF TELECOMMUNICATIONS, 2017, 72 (5-6) : 359 - 370
  • [5] Efficient designated server identity-based encryption with conjunctive keyword search
    Yang Lu
    Gang Wang
    Jiguo Li
    Jian Shen
    Annals of Telecommunications, 2017, 72 : 359 - 370
  • [6] A designated Server Identity-based Encryption Scheme with Bidirectional Keyword Search
    Lv, Jinghui
    Dong, Ruihan
    Yang, Xin
    Jia, Chenyang
    2024 6TH INTERNATIONAL CONFERENCE ON NATURAL LANGUAGE PROCESSING, ICNLP 2024, 2024, : 283 - 289
  • [7] Identity-based searchable encryption scheme with a designated tester
    Wang, Shao-Hui
    Han, Zhi-Jie
    Xiao, Fu
    Wang, Ru-Chuan
    Wang, Shao-Hui, 1600, Editorial Board of Journal on Communications (35): : 22 - 32
  • [8] Designated tester certificateless encryption with keyword search
    Pakniat, Nasrollah
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2019, 49
  • [9] Designing a secure designated server identity-based encryption with keyword search scheme: still unsolved
    Mahnaz Noroozi
    Iman Karoubi
    Ziba Eslami
    Annals of Telecommunications, 2018, 73 : 769 - 776
  • [10] Designing a secure designated server identity-based encryption with keyword search scheme: still unsolved
    Noroozi, Mahnaz
    Karoubi, Iman
    Eslami, Ziba
    ANNALS OF TELECOMMUNICATIONS, 2018, 73 (11-12) : 769 - 776