A more efficient public-key authenticated encryption scheme with keyword search

被引:13
|
作者
Huang, Qiong [1 ,2 ]
Huang, Peisen [1 ]
Li, Hongbo [1 ]
Huang, Jianye [3 ]
Lin, Hongyuan [1 ]
机构
[1] South China Agr Univ, Coll Math & Informat, Guangzhou 510642, Peoples R China
[2] Guangzhou Key Lab Intelligent Agr, Guangzhou 510642, Peoples R China
[3] Univ Wollongong, Sch Comp & Informat Technol, Wollongong, NSW 2500, Australia
基金
中国国家自然科学基金;
关键词
Keyword search; Inside keyword guessing attacks; Low storage overhead; Inverted index; Fast search; GUESSING ATTACKS; SECURE; INTERNET;
D O I
10.1016/j.sysarc.2023.102839
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
To realize ciphertext retrieval without decryption in the public key settings, Boneh et al. in 2004 proposed a cryptographic primitive named Public-key Encryption with Keyword Search (PEKS) and proposed the first PEKS scheme. Following Boneh et al.'s work, various PEKS schemes were proposed; however, most schemes are vulnerable to inside keyword guessing attacks (IKGA). Huang and Li proposed a new primitive named Public -key Authenticated Encryption with Keyword Search (PAEKS) in 2017, which resists the IKGA in the setting of only one test server. Their main idea to resist IKGA is to require the data sender to authenticate the ciphertext while encrypting a keyword. However, in the era of big data, as the number of encrypted files increases, huge storage overhead and heavy retrieval costs become problems in PAEKS. In this paper, we proposed a new PAEKS scheme that costs low storage space and supports fast search. We introduced the ciphertext deduplication into PAEKS to reduce storage space and leveraged the inverted index to accelerate the retrieval process. We simulated the proposed scheme and several related schemes with a desktop computer. The experiment results show that our proposed scheme is of lower storage overhead and higher retrieval efficiency compared with related schemes.
引用
收藏
页数:8
相关论文
共 50 条
  • [21] User-Friendly Public-Key Authenticated Encryption With Keyword Search for Industrial Internet of Things
    Pu, Lang
    Lin, Chao
    Chen, Biwen
    He, Debiao
    IEEE INTERNET OF THINGS JOURNAL, 2023, 10 (15) : 13544 - 13555
  • [22] Public-Key Encryption with Keyword Search from Lattice
    Hou, Changjiang
    Liu, Fei
    Bai, Hongtao
    Ren, Lanfang
    2013 EIGHTH INTERNATIONAL CONFERENCE ON P2P, PARALLEL, GRID, CLOUD AND INTERNET COMPUTING (3PGCIC 2013), 2013, : 336 - 339
  • [23] Efficient public-key authenticated deniable encryption schemes
    Cao, Yanmei
    Wei, Jianghong
    Zhang, Fangguo
    Xiang, Yang
    Chen, Xiaofeng
    COMPUTER STANDARDS & INTERFACES, 2022, 82
  • [24] Efficient Keyword Search for Public-Key Setting
    Zhang, Rui
    Xue, Rui
    2015 IEEE MILITARY COMMUNICATIONS CONFERENCE (MILCOM 2015), 2015, : 1236 - 1241
  • [25] Public Key Authenticated Encryption with Keyword Search from LWE
    Cheng, Leixiao
    Meng, Fei
    COMPUTER SECURITY - ESORICS 2022, PT I, 2022, 13554 : 303 - 324
  • [26] Public-Key Encryption with Fuzzy Keyword Search: A Provably Secure Scheme under Keyword Guessing Attack
    Xu, Peng
    Jin, Hai
    Wu, Qianhong
    Wang, Wei
    IEEE TRANSACTIONS ON COMPUTERS, 2013, 62 (11) : 2266 - 2277
  • [27] Public-Key Authenticated Encryption with Keyword Search: A Generic Construction and Its Quantum-Resistant Instantiation
    Liu, Zi-Yuan
    Tseng, Yi-Fan
    Tso, Raylin
    Mambo, Masahiro
    Chen, Yu-Chi
    COMPUTER JOURNAL, 2022, 65 (10): : 2828 - 2844
  • [28] Public-key Authenticated Encryption with Keyword Search: Cryptanalysis, Enhanced Security, and Quantum-resistant Instantiation
    Liu, Zi-Yuan
    Tseng, Yi-Fan
    Tso, Raylin
    Mambo, Masahiro
    Chen, Yu-Chi
    ASIA CCS'22: PROCEEDINGS OF THE 2022 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2022, : 423 - 436
  • [29] AN EFFICIENT PUBLIC KEY ENCRYPTION WITH CONJUNCTIVE KEYWORD SEARCH SCHEME BASED ON PAIRINGS
    Ding, Maozhen
    Gao, Fei
    Jin, Zhengping
    Zhang, Hua
    PROCEEDINGS OF THE 3RD IEEE INTERNATIONAL CONFERENCE ON NETWORK INFRASTRUCTURE AND DIGITAL CONTENT (IEEE IC-NIDC 2012), 2012, : 526 - 530
  • [30] A Lightweight Blockchain-based Public-Key Authenticated Encryption with Multi-Keyword Search for Cloud Computing
    Du, Haorui
    Chen, Jianhua
    Lin, Fei
    Peng, Cong
    He, Debiao
    SECURITY AND COMMUNICATION NETWORKS, 2022, 2022