TCA-PEKS: Trusted certificateless authentication public-key encryption with keyword search scheme in cloud storage

被引:4
|
作者
Han, Mu [1 ]
Xu, Puyi [1 ]
Xu, Lei [2 ]
Xu, Chungen [2 ]
机构
[1] Jiangsu Univ, Sch Comp Sci & Commun Engn, Zhenjiang 212000, Jiangsu, Peoples R China
[2] Nanjing Univ Sci & Technol, Sch Math & Stat, Nanjing 210000, Peoples R China
基金
中国国家自然科学基金;
关键词
Public-key searchable encryption; Blockchain; Smart contract; Certificateless cryptosystem; SECURE;
D O I
10.1007/s12083-022-01392-7
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Public key encryption with keyword search (PEKS) technology is capable of achieving accurate ciphertext retrieval while protecting data privacy. However, curious or malicious semi-trusted cloud servers can cause privacy breaches, which then creates a trust problem for ciphertext management and searching. To address this problem, we propose a trusted certificateless authentication public-key encryption with a keyword search scheme in cloud storage (TCA-PEKS), which ensuring trusted retrieval, simultaneously resolves the problems of key escrow and certificate management that exist in PEKS. In the scheme, the security of the ciphertext storage and verifications are strengthened based on blockchain non-tampering features, which assists users in verifying the correctness of a file. In particular, we construct an open and transparent smart contract to limit the malicious behaviour of cloud servers, in which the user's complete private key splits the secret value and the partial private key, further guaranteeing the correctness of the retrieval process. Finally, the scheme is proven to satisfy ciphertext and trapdoor indistinguishability under the random oracle model, and the performance evaluation results show that the scheme is highly efficient.
引用
收藏
页码:156 / 169
页数:14
相关论文
共 50 条
  • [31] Pairing-free public-key authenticated encryption with keyword search
    Bai, Lisha
    Yong, Lei
    Chen, Zhixian
    Shao, Jun
    COMPUTER STANDARDS & INTERFACES, 2024, 88
  • [32] Provably secure public-key encryption with conjunctive and subset keyword search
    Farras, Oriol
    Ribes-Gonzalez, Jordi
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2019, 18 (05) : 533 - 548
  • [33] Forward Secure Public-key Authenticated Encryption with Conjunctive Keyword Search
    JIANG, Z. H. E.
    ZHANG, K. A., I
    WANG, L. I. A. N. G. L. I. A. N. G.
    NING, J. I. A. N. T. I. N. G.
    COMPUTER JOURNAL, 2023, 66 (09): : 2265 - 2278
  • [34] Constructing pairing-free certificateless public key encryption with keyword search
    Yang Lu
    Ji-guo Li
    Frontiers of Information Technology & Electronic Engineering, 2019, 20 : 1049 - 1060
  • [35] Provably secure public-key encryption with conjunctive and subset keyword search
    Oriol Farràs
    Jordi Ribes-González
    International Journal of Information Security, 2019, 18 : 533 - 548
  • [36] Improved Security Model for Public-Key Authenticated Encryption with Keyword Search
    Qin, Baodong
    Cui, Hui
    Zheng, Xiaokun
    Zheng, Dong
    PROVABLE AND PRACTICAL SECURITY, PROVSEC 2021, 2021, 13059 : 19 - 38
  • [37] Constructing pairing-free certificateless public key encryption with keyword search
    Lu, Yang
    Li, Ji-guo
    FRONTIERS OF INFORMATION TECHNOLOGY & ELECTRONIC ENGINEERING, 2019, 20 (08) : 1049 - 1060
  • [38] Generic Construction of Public-Key Authenticated Encryption with Keyword Search Revisited
    Emura, Keita
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2024, E107A (03) : 260 - 274
  • [39] Generic construction of designated tester public-key encryption with keyword search
    Rhee, Hyun Sook
    Park, Jong Hwan
    Lee, Dong Noon
    INFORMATION SCIENCES, 2012, 205 : 93 - 109
  • [40] Certificateless Public Key Authenticated Encryption with Keyword Search Achieving Stronger Security
    Lu, Jingwei
    Li, Hongbo
    Huang, Jianye
    Ma, Sha
    Au, Man Ho Allen
    Huang, Qiong
    INFORMATION, 2023, 14 (03)