Designated Cloud Server Public Key Encryption with Keyword Search from Lattice in the Standard Model

被引:0
|
作者
ZHANG Xiaojun [1 ,2 ]
XU Chunxiang [2 ]
XIE Run [2 ]
JIN Chunhua [2 ]
机构
[1] School of Computer Science, Southwest Petroleum University
[2] School of Computer Science and Engineering, University of Electronic Science and Technology of China
基金
中国国家自然科学基金; 中国博士后科学基金;
关键词
Cloud storage; Public key encryption with keyword search; Lattice assumption; Standard model;
D O I
暂无
中图分类号
TN918.4 [密码的加密与解密];
学科分类号
0839 ; 1402 ;
摘要
Recently, how to retrieve the encrypted data efficiently from a cloud storage system becomes a hot topic. Public key encryption with keyword search(PEKS)can allow one to search the encrypted data with a keyword efficiently. Due to the booming of post-quantum cryptography, we propose public key encryption with keyword search from lattice assumption, which can resist quantum computer attacks. We delegate a particular cloud server to search the results, thus only the designated cloud server can finish the test process. Our scheme has been proved ciphertext indistinguishability in the standard model, which can reflect its security in the real world. To the best of our knowledge, our scheme is the first construction based on lattice in the standard model, which is a step stone in the post-quantum cryptographic communication.
引用
收藏
页码:304 / 309
页数:6
相关论文
共 50 条
  • [31] Public key encryption with distributed keyword search
    Eslami, Ziba
    Noroozi, Mahnaz
    Amirizirtol, Kobra
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2022, 25 (08): : 2369 - 2393
  • [32] Certificateless Public Key Encryption with Keyword Search
    Peng Yanguo
    Cui Jiangtao
    Peng Changgen
    Ying Zuobin
    CHINA COMMUNICATIONS, 2014, 11 (11) : 100 - 113
  • [33] Public Key Authenticated Encryption with Keyword Search from LWE
    Cheng, Leixiao
    Meng, Fei
    COMPUTER SECURITY - ESORICS 2022, PT I, 2022, 13554 : 303 - 324
  • [34] Efficient designated server identity-based encryption with conjunctive keyword search
    Lu, Yang
    Wang, Gang
    Li, Jiguo
    Shen, Jian
    ANNALS OF TELECOMMUNICATIONS, 2017, 72 (5-6) : 359 - 370
  • [35] A designated Server Identity-based Encryption Scheme with Bidirectional Keyword Search
    Lv, Jinghui
    Dong, Ruihan
    Yang, Xin
    Jia, Chenyang
    2024 6TH INTERNATIONAL CONFERENCE ON NATURAL LANGUAGE PROCESSING, ICNLP 2024, 2024, : 283 - 289
  • [36] Efficient designated server identity-based encryption with conjunctive keyword search
    Yang Lu
    Gang Wang
    Jiguo Li
    Jian Shen
    Annals of Telecommunications, 2017, 72 : 359 - 370
  • [37] SPEKS: Secure Server-Designation Public Key Encryption with Keyword Search against Keyword Guessing Attacks
    Chen, Yu-Chi
    COMPUTER JOURNAL, 2015, 58 (04): : 922 - 933
  • [38] Forward Secure Public Key Encryption with Keyword Search for Cloud-assisted IoT
    Kim, Hyeongseob
    Hahn, Changhee
    Hur, Junbeom
    2020 IEEE 13TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING (CLOUD 2020), 2020, : 549 - 556
  • [39] Provably secure public key encryption with keyword search for data outsourcing in cloud environments
    Ghosh, Sudeep
    Islam, S. K. Hafizul
    Bisht, Abhishek
    Das, Ashok Kumar
    JOURNAL OF SYSTEMS ARCHITECTURE, 2023, 139
  • [40] iPEKS: Fast and Secure Cloud Data Retrieval from the Public-key Encryption with Keyword Search
    Tseng, Fu-Kuo
    Chen, Rong-Jaye
    Lin, Bao-Shuh Paul
    2013 12TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2013), 2013, : 452 - 458