TCA-PEKS: Trusted certificateless authentication public-key encryption with keyword search scheme in cloud storage

被引:4
|
作者
Han, Mu [1 ]
Xu, Puyi [1 ]
Xu, Lei [2 ]
Xu, Chungen [2 ]
机构
[1] Jiangsu Univ, Sch Comp Sci & Commun Engn, Zhenjiang 212000, Jiangsu, Peoples R China
[2] Nanjing Univ Sci & Technol, Sch Math & Stat, Nanjing 210000, Peoples R China
基金
中国国家自然科学基金;
关键词
Public-key searchable encryption; Blockchain; Smart contract; Certificateless cryptosystem; SECURE;
D O I
10.1007/s12083-022-01392-7
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Public key encryption with keyword search (PEKS) technology is capable of achieving accurate ciphertext retrieval while protecting data privacy. However, curious or malicious semi-trusted cloud servers can cause privacy breaches, which then creates a trust problem for ciphertext management and searching. To address this problem, we propose a trusted certificateless authentication public-key encryption with a keyword search scheme in cloud storage (TCA-PEKS), which ensuring trusted retrieval, simultaneously resolves the problems of key escrow and certificate management that exist in PEKS. In the scheme, the security of the ciphertext storage and verifications are strengthened based on blockchain non-tampering features, which assists users in verifying the correctness of a file. In particular, we construct an open and transparent smart contract to limit the malicious behaviour of cloud servers, in which the user's complete private key splits the secret value and the partial private key, further guaranteeing the correctness of the retrieval process. Finally, the scheme is proven to satisfy ciphertext and trapdoor indistinguishability under the random oracle model, and the performance evaluation results show that the scheme is highly efficient.
引用
收藏
页码:156 / 169
页数:14
相关论文
共 50 条
  • [1] TCA-PEKS: Trusted certificateless authentication public-key encryption with keyword search scheme in cloud storage
    Mu Han
    Puyi Xu
    Lei Xu
    Chungen Xu
    Peer-to-Peer Networking and Applications, 2023, 16 : 156 - 169
  • [2] Towards Enhanced Security for Certificateless Public-Key Authenticated Encryption with Keyword Search
    Liu, Xueqiao
    Li, Hongbo
    Yang, Guomin
    Susilo, Willy
    Tonien, Joseph
    Huang, Qiong
    PROVABLE SECURITY, PROVSEC 2019, 2019, 11821 : 113 - 129
  • [3] Certificateless Public Key Encryption with Keyword Search
    Peng Yanguo
    Cui Jiangtao
    Peng Changgen
    Ying Zuobin
    CHINA COMMUNICATIONS, 2014, 11 (11) : 100 - 113
  • [4] Dual-Server Public-Key Encryption With Keyword Search for Secure Cloud Storage
    Chen, Rongmao
    Mu, Yi
    Yang, Guomin
    Guo, Fuchun
    Wang, Xiaofen
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2016, 11 (04) : 789 - 798
  • [5] Blockchain-Assisted Public-Key Encryption with Keyword Search Against Keyword Guessing Attacks for Cloud Storage
    Zhang, Yuan
    Xu, Chunxiang
    Ni, Jianbing
    Li, Hongwei
    Shen, Xuemin
    IEEE TRANSACTIONS ON CLOUD COMPUTING, 2021, 9 (04) : 1335 - 1348
  • [6] A more efficient public-key authenticated encryption scheme with keyword search
    Huang, Qiong
    Huang, Peisen
    Li, Hongbo
    Huang, Jianye
    Lin, Hongyuan
    JOURNAL OF SYSTEMS ARCHITECTURE, 2023, 137
  • [7] Public-Key Encryption with Integrated Keyword Search
    Vishal Saraswat
    Rajeev Anand Sahu
    Gaurav Sharma
    Veronika Kuchta
    Olivier Markowitch
    Journal of Hardware and Systems Security, 2019, 3 (1) : 12 - 25
  • [8] Public-Key Encryption with Registered Keyword Search
    Tang, Qiang
    Chen, Liqun
    PUBLIC KEY INFRASTRUCTURES, SERVICES AND APPLICATIONS, 2010, 6391 : 163 - +
  • [9] On the Security of a Certificateless Public Key Encryption with Keyword Search
    Wu, Tsu-Yang
    Meng, Chao
    Chen, Chien-Ming
    Wang, King-Hang
    Pan, Jeng-Shyang
    ADVANCES IN INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING, PT I, 2018, 81 : 191 - 197
  • [10] Efficient Public Encryption Scheme with Keyword Search for Cloud Storage
    Guo L.
    Li Z.
    Hu L.
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2020, 57 (07): : 1404 - 1414