Designated-tester Identity-Based Authenticated Encryption with Keyword Search with applications in cloud systems

被引:0
|
作者
Shiraly, Danial [1 ]
Eslami, Ziba [1 ]
Pakniat, Nasrollah [2 ]
机构
[1] Shahid Beheshti Univ, Dept Data & Comp Sci, Tehran, Iran
[2] Iranian Res Inst Informat Sci & Technol IRANDOC, Informat Sci Res Dept, Tehran, Iran
关键词
Cloud computing; Searchable encryption; Identity-based encryption; Authenticated encryption; Keyword guessing attack; PUBLIC-KEY ENCRYPTION; ID-BASED ENCRYPTION; SCHEME;
D O I
10.1016/j.sysarc.2024.103183
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The advent of cloud computing has made cloud server outsourcing increasingly popular among data owners. However, the storage of sensitive data on cloud servers engenders serious challenges for the security and privacy of data. Public Key Authenticated Encryption with Keyword Search (PAEKS) is an effective method that protects information confidentiality and supports keyword searches. Identity -Based Authenticated Encryption with Keyword Search (IBAEKS) is a PAEKS variant in identity -based settings, designed for solving the intractable certificate management problem. To the best of our knowledge, only two IBAEKS schemes exist in the literature, both presented with weak security models that make them vulnerable against what is known as Fully Chosen Keyword attacks. Moreover, the existing IBAEKS schemes are based on the time-consuming bilinear pairing operation, leading to a significant increase in computational cost. To overcome these issues, in this paper, we first propose an enhanced security model for IBAEKS and compare it with existing models. We then prove that the existing IBAEKS schemes are not secure in our enhanced model. We also propose an efficient pairing -free dIBAEKS scheme and prove that it is secure under the enhanced security model. Finally, we compare our proposed scheme with related constructions to indicate its overall superiority.
引用
收藏
页数:11
相关论文
共 50 条
  • [41] Identity-based proxy matchmaking encryption for cloud-based anonymous messaging systems
    Yan, Zhen
    Qu, Haipeng
    Zhang, Xiaoshuai
    Xu, Jian-Liang
    Lin, Xi-Jun
    JOURNAL OF SYSTEMS ARCHITECTURE, 2023, 142
  • [42] Designated Cloud Server Public Key Encryption with Keyword Search from Lattice in the Standard Model
    Zhang Xiaojun
    Xu Chunxiang
    Xie Run
    Jin Chunhua
    CHINESE JOURNAL OF ELECTRONICS, 2018, 27 (02) : 304 - 309
  • [43] Designated Cloud Server Public Key Encryption with Keyword Search from Lattice in the Standard Model
    ZHANG Xiaojun
    XU Chunxiang
    XIE Run
    JIN Chunhua
    ChineseJournalofElectronics, 2018, 27 (02) : 304 - 309
  • [44] Anonymous Fuzzy Identity-Based Encryption for Similarity Search
    Cheung, David W.
    Mamoulis, Nikos
    Wong, W. K.
    Yiu, S. M.
    Zhang, Ye
    ALGORITHMS AND COMPUTATION, PT I, 2010, 6506 : 61 - 72
  • [45] A new construction of public key authenticated encryption with keyword search based on LWE
    Wang, Ziqing
    Li, Jin
    Liu, Xiaoguang
    Wu, Xinyan
    Li, Fagen
    TELECOMMUNICATION SYSTEMS, 2024, 86 (02) : 229 - 240
  • [46] Provably Secure Public Key Authenticated Encryption with Keyword Search Based on SGX
    Liu Y.
    Qin G.
    Liu P.
    Hu C.
    Guo S.
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2023, 60 (12): : 2709 - 2724
  • [47] Proxy re-encryption systems for identity-based encryption
    Matsuo, Toshihiko
    Pairing-Based Cryptography - Pairing 2007, 2007, 4575 : 247 - 267
  • [48] Incentive Public Auditing Scheme with Identity-Based Designated Verifier in Cloud
    Shao, Bilin
    Zhang, Li
    Bian, Genqing
    ELECTRONICS, 2023, 12 (06)
  • [49] An authenticated identity-based key establishment and encryption scheme for wireless sensor networks
    College of Computer, Nanjing University of Posts and Telecommunications, Nanjing 210003, China
    不详
    J. China Univ. Post Telecom., 2006, 2 (31-38):
  • [50] Anonymous Multi-Receiver Identity-Based Authenticated Encryption with CCA Security
    Fan, Chun-I
    Tseng, Yi-Fan
    SYMMETRY-BASEL, 2015, 7 (04): : 1856 - 1881