Designated Cloud Server Public Key Encryption with Keyword Search from Lattice in the Standard Model

被引:0
|
作者
ZHANG Xiaojun [1 ,2 ]
XU Chunxiang [2 ]
XIE Run [2 ]
JIN Chunhua [2 ]
机构
[1] School of Computer Science, Southwest Petroleum University
[2] School of Computer Science and Engineering, University of Electronic Science and Technology of China
基金
中国国家自然科学基金; 中国博士后科学基金;
关键词
Cloud storage; Public key encryption with keyword search; Lattice assumption; Standard model;
D O I
暂无
中图分类号
TN918.4 [密码的加密与解密];
学科分类号
0839 ; 1402 ;
摘要
Recently, how to retrieve the encrypted data efficiently from a cloud storage system becomes a hot topic. Public key encryption with keyword search(PEKS)can allow one to search the encrypted data with a keyword efficiently. Due to the booming of post-quantum cryptography, we propose public key encryption with keyword search from lattice assumption, which can resist quantum computer attacks. We delegate a particular cloud server to search the results, thus only the designated cloud server can finish the test process. Our scheme has been proved ciphertext indistinguishability in the standard model, which can reflect its security in the real world. To the best of our knowledge, our scheme is the first construction based on lattice in the standard model, which is a step stone in the post-quantum cryptographic communication.
引用
收藏
页码:304 / 309
页数:6
相关论文
共 50 条
  • [41] Public-Key Encryption with Registered Keyword Search
    Tang, Qiang
    Chen, Liqun
    PUBLIC KEY INFRASTRUCTURES, SERVICES AND APPLICATIONS, 2010, 6391 : 163 - +
  • [42] Public key encryption with conjunctive field keyword search
    Park, DJ
    Kim, K
    Lee, PJ
    INFORMATION SECURITY APPLICATIONS, 2005, 3325 : 73 - 86
  • [43] Public Key Encryption with Multi-keyword Search
    Hu, Chengyu
    He, Peng
    Liu, Pengtao
    NETWORK COMPUTING AND INFORMATION SECURITY, 2012, 345 : 568 - +
  • [44] Public key encryption with temporary and fuzzy keyword search
    Vaanchig, Nyamsuren
    Qin, Zhiguang
    MATHEMATICAL BIOSCIENCES AND ENGINEERING, 2019, 16 (05) : 3914 - 3935
  • [45] Efficient public key encryption with revocable keyword search
    Yu, Yong
    Ni, Jianbing
    Yang, Haomiao
    Mu, Yi
    Susilo, Willy
    SECURITY AND COMMUNICATION NETWORKS, 2014, 7 (02) : 466 - 472
  • [46] On the Security of a Certificateless Public Key Encryption with Keyword Search
    Wu, Tsu-Yang
    Meng, Chao
    Chen, Chien-Ming
    Wang, King-Hang
    Pan, Jeng-Shyang
    ADVANCES IN INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING, PT I, 2018, 81 : 191 - 197
  • [47] Public-Key Encryption with Integrated Keyword Search
    Vishal Saraswat
    Rajeev Anand Sahu
    Gaurav Sharma
    Veronika Kuchta
    Olivier Markowitch
    Journal of Hardware and Systems Security, 2019, 3 (1) : 12 - 25
  • [48] Public Key Encryption with Keyword Search from Lattices in Multiuser Environments
    Wu, Daini
    Wang, Xiaoming
    Gan, Qingqing
    MATHEMATICAL PROBLEMS IN ENGINEERING, 2016, 2016
  • [49] Revocable Public Key Encryption with Authorized Keyword Search
    Xu, Wujing
    Dong, Xiaolei
    Cao, Zhenfu
    Shen, Jiachen
    PROCEEDINGS OF 2019 IEEE 3RD INFORMATION TECHNOLOGY, NETWORKING, ELECTRONIC AND AUTOMATION CONTROL CONFERENCE (ITNEC 2019), 2019, : 857 - 860
  • [50] Efficient public key encryption with keyword search schemes from pairings
    Gu, Chunxiang
    Zhu, Yuefei
    Pan, Heng
    INFORMATION SECURITY AND CRYPTOLOGY, 2008, 4990 : 372 - +