Designated Cloud Server Public Key Encryption with Keyword Search from Lattice in the Standard Model

被引:0
|
作者
ZHANG Xiaojun [1 ,2 ]
XU Chunxiang [2 ]
XIE Run [2 ]
JIN Chunhua [2 ]
机构
[1] School of Computer Science, Southwest Petroleum University
[2] School of Computer Science and Engineering, University of Electronic Science and Technology of China
基金
中国国家自然科学基金; 中国博士后科学基金;
关键词
Cloud storage; Public key encryption with keyword search; Lattice assumption; Standard model;
D O I
暂无
中图分类号
TN918.4 [密码的加密与解密];
学科分类号
0839 ; 1402 ;
摘要
Recently, how to retrieve the encrypted data efficiently from a cloud storage system becomes a hot topic. Public key encryption with keyword search(PEKS)can allow one to search the encrypted data with a keyword efficiently. Due to the booming of post-quantum cryptography, we propose public key encryption with keyword search from lattice assumption, which can resist quantum computer attacks. We delegate a particular cloud server to search the results, thus only the designated cloud server can finish the test process. Our scheme has been proved ciphertext indistinguishability in the standard model, which can reflect its security in the real world. To the best of our knowledge, our scheme is the first construction based on lattice in the standard model, which is a step stone in the post-quantum cryptographic communication.
引用
收藏
页码:304 / 309
页数:6
相关论文
共 50 条
  • [21] Provable Secure Dual-Server Public Key Encryption with Keyword Search
    Huang, Kaibin
    Tso, Raylin
    2017 IEEE 2ND INTERNATIONAL VERIFICATION AND SECURITY WORKSHOP (IVSW), 2017, : 39 - 44
  • [22] Efficient public key encryption with revocable keyword search in cloud computing
    Zhang, Jianhong
    Mao, Jian
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2016, 19 (03): : 1211 - 1217
  • [23] On the Security of Secure Server-Designation Public Key Encryption with Keyword Search
    Lin, Xi-Jun
    Sun, Lin
    Qu, Haipeng
    Liu, Dongxiao
    COMPUTER JOURNAL, 2018, 61 (12): : 1791 - 1793
  • [24] Comments on Islam Et Al.'s Certificateless Designated Server Based Public Key Encryption with Keyword Search Scheme
    Wu, Tsu-Yang
    Meng, Chao
    Wang, King-Hang
    Chen, Chien-Ming
    Pan, Jeng-Shyang
    GENETIC AND EVOLUTIONARY COMPUTING, 2018, 579 : 199 - 205
  • [25] Generic combination of public key encryption with keyword search and public key encryption
    Zhang, Rui
    Imai, Hideki
    CRYPTOLOGY AND NETWORK SECURITY, 2007, 4856 : 159 - 174
  • [26] On the integration of public key data encryption and public key encryption with keyword search
    Baek, Joonsang
    Safavi-Naini, Reihaneh
    Susilo, Willy
    INFORMATION SECURITY, PROCEEDINGS, 2006, 4176 : 217 - 232
  • [27] The Public Verifiability of Public Key Encryption with Keyword Search
    Zhu, Binrui
    Sun, Jiameng
    Qin, Jing
    Ma, Jixin
    MOBILE NETWORKS AND MANAGEMENT (MONAMI 2017), 2018, 235 : 299 - 312
  • [28] Public key encryption with keyword search revisited
    Baek, Joonsang
    Safavi-Naini, Reihaneh
    Susilo, Willy
    COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2008, PT 1, PROCEEDINGS, 2008, 5072 : 1249 - 1259
  • [29] Public Key Encryption with Wildcards Keyword Search
    Wang, Zhao-li
    Han, Jin-li
    Wang, Mei-juan
    Shi, Ya-qing
    Dong, Hui
    2018 EIGHTH INTERNATIONAL CONFERENCE ON INSTRUMENTATION AND MEASUREMENT, COMPUTER, COMMUNICATION AND CONTROL (IMCCC 2018), 2018, : 538 - 541
  • [30] Forward Secure Public Key Encryption with Keyword Search for Outsourced Cloud Storage
    Zeng, Ming
    Qian, Haifeng
    Chen, Jie
    Zhang, Kai
    IEEE TRANSACTIONS ON CLOUD COMPUTING, 2022, 10 (01) : 426 - 438