TCA-PEKS: Trusted certificateless authentication public-key encryption with keyword search scheme in cloud storage

被引:4
|
作者
Han, Mu [1 ]
Xu, Puyi [1 ]
Xu, Lei [2 ]
Xu, Chungen [2 ]
机构
[1] Jiangsu Univ, Sch Comp Sci & Commun Engn, Zhenjiang 212000, Jiangsu, Peoples R China
[2] Nanjing Univ Sci & Technol, Sch Math & Stat, Nanjing 210000, Peoples R China
基金
中国国家自然科学基金;
关键词
Public-key searchable encryption; Blockchain; Smart contract; Certificateless cryptosystem; SECURE;
D O I
10.1007/s12083-022-01392-7
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Public key encryption with keyword search (PEKS) technology is capable of achieving accurate ciphertext retrieval while protecting data privacy. However, curious or malicious semi-trusted cloud servers can cause privacy breaches, which then creates a trust problem for ciphertext management and searching. To address this problem, we propose a trusted certificateless authentication public-key encryption with a keyword search scheme in cloud storage (TCA-PEKS), which ensuring trusted retrieval, simultaneously resolves the problems of key escrow and certificate management that exist in PEKS. In the scheme, the security of the ciphertext storage and verifications are strengthened based on blockchain non-tampering features, which assists users in verifying the correctness of a file. In particular, we construct an open and transparent smart contract to limit the malicious behaviour of cloud servers, in which the user's complete private key splits the secret value and the partial private key, further guaranteeing the correctness of the retrieval process. Finally, the scheme is proven to satisfy ciphertext and trapdoor indistinguishability under the random oracle model, and the performance evaluation results show that the scheme is highly efficient.
引用
收藏
页码:156 / 169
页数:14
相关论文
共 50 条
  • [21] Public-Key Authenticated Encryption with Keyword Search Without Pairings
    Yang N.
    Zhou Q.
    Xu S.
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2020, 57 (10): : 2125 - 2135
  • [22] Forward Secure Public Key Encryption with Keyword Search for Outsourced Cloud Storage
    Zeng, Ming
    Qian, Haifeng
    Chen, Jie
    Zhang, Kai
    IEEE TRANSACTIONS ON CLOUD COMPUTING, 2022, 10 (01) : 426 - 438
  • [23] FS-PEKS: Lattice-Based Forward Secure Public-Key Encryption with Keyword Search for Cloud-Assisted Industrial Internet of Things
    Zhang, Xiaojun
    Xu, Chunxiang
    Wang, Huaxiong
    Zhang, Yuan
    Wang, Shixiong
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2021, 18 (03) : 1019 - 1032
  • [24] Public Key Encryption with Keyword Search in Cloud: A Survey
    Zhou, Yunhong
    Li, Na
    Tian, Yanmei
    An, Dezhi
    Wang, Licheng
    ENTROPY, 2020, 22 (04)
  • [25] iPEKS: Fast and Secure Cloud Data Retrieval from the Public-key Encryption with Keyword Search
    Tseng, Fu-Kuo
    Chen, Rong-Jaye
    Lin, Bao-Shuh Paul
    2013 12TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2013), 2013, : 452 - 458
  • [26] SR-PEKS: Subversion-Resistant Public Key Encryption With Keyword Search
    Jiang, Changsong
    Xu, Chunxiang
    Zhang, Zhao
    Chen, Kefei
    IEEE TRANSACTIONS ON CLOUD COMPUTING, 2023, 11 (03) : 3168 - 3183
  • [27] Efficient public-key searchable encryption against inside keyword guessing attacks for cloud storage
    Wu, Axin
    Li, Fagen
    Xin, Xiangjun
    Zhang, Yinghui
    Zhu, Jianhao
    JOURNAL OF SYSTEMS ARCHITECTURE, 2024, 149
  • [28] PEKSrand: Providing Predicate Privacy in Public-key Encryption with Keyword Search
    Zhu, Benwen
    Zhu, Bo
    Ren, Kui
    2011 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2011,
  • [29] Dual-Server Public-Key Authenticated Encryption with Keyword Search
    Chen, Biwen
    Wu, Libing
    Zeadally, Sherali
    He, Debiao
    IEEE TRANSACTIONS ON CLOUD COMPUTING, 2022, 10 (01) : 322 - 333
  • [30] Exposure Resilient Public-key Encryption with Keyword Search against Keyword Guessing Attack
    Uemura, Kaito
    Obana, Satoshi
    SECRYPT 2021: PROCEEDINGS OF THE 18TH INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2021, : 692 - 697