A more efficient public-key authenticated encryption scheme with keyword search

被引:13
|
作者
Huang, Qiong [1 ,2 ]
Huang, Peisen [1 ]
Li, Hongbo [1 ]
Huang, Jianye [3 ]
Lin, Hongyuan [1 ]
机构
[1] South China Agr Univ, Coll Math & Informat, Guangzhou 510642, Peoples R China
[2] Guangzhou Key Lab Intelligent Agr, Guangzhou 510642, Peoples R China
[3] Univ Wollongong, Sch Comp & Informat Technol, Wollongong, NSW 2500, Australia
基金
中国国家自然科学基金;
关键词
Keyword search; Inside keyword guessing attacks; Low storage overhead; Inverted index; Fast search; GUESSING ATTACKS; SECURE; INTERNET;
D O I
10.1016/j.sysarc.2023.102839
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
To realize ciphertext retrieval without decryption in the public key settings, Boneh et al. in 2004 proposed a cryptographic primitive named Public-key Encryption with Keyword Search (PEKS) and proposed the first PEKS scheme. Following Boneh et al.'s work, various PEKS schemes were proposed; however, most schemes are vulnerable to inside keyword guessing attacks (IKGA). Huang and Li proposed a new primitive named Public -key Authenticated Encryption with Keyword Search (PAEKS) in 2017, which resists the IKGA in the setting of only one test server. Their main idea to resist IKGA is to require the data sender to authenticate the ciphertext while encrypting a keyword. However, in the era of big data, as the number of encrypted files increases, huge storage overhead and heavy retrieval costs become problems in PAEKS. In this paper, we proposed a new PAEKS scheme that costs low storage space and supports fast search. We introduced the ciphertext deduplication into PAEKS to reduce storage space and leveraged the inverted index to accelerate the retrieval process. We simulated the proposed scheme and several related schemes with a desktop computer. The experiment results show that our proposed scheme is of lower storage overhead and higher retrieval efficiency compared with related schemes.
引用
收藏
页数:8
相关论文
共 50 条
  • [31] PEKSrand: Providing Predicate Privacy in Public-key Encryption with Keyword Search
    Zhu, Benwen
    Zhu, Bo
    Ren, Kui
    2011 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2011,
  • [32] Exposure Resilient Public-key Encryption with Keyword Search against Keyword Guessing Attack
    Uemura, Kaito
    Obana, Satoshi
    SECRYPT 2021: PROCEEDINGS OF THE 18TH INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2021, : 692 - 697
  • [33] An efficient public-key searchable encryption scheme secure against inside keyword guessing attacks
    Huang, Qiong
    Li, Hongbo
    INFORMATION SCIENCES, 2017, 403 : 1 - 14
  • [34] Provably secure public-key encryption with conjunctive and subset keyword search
    Farras, Oriol
    Ribes-Gonzalez, Jordi
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2019, 18 (05) : 533 - 548
  • [35] Provably secure public-key encryption with conjunctive and subset keyword search
    Oriol Farràs
    Jordi Ribes-González
    International Journal of Information Security, 2019, 18 : 533 - 548
  • [36] Efficient public key encryption with revocable keyword search
    Yu, Yong
    Ni, Jianbing
    Yang, Haomiao
    Mu, Yi
    Susilo, Willy
    SECURITY AND COMMUNICATION NETWORKS, 2014, 7 (02) : 466 - 472
  • [37] Generic construction of designated tester public-key encryption with keyword search
    Rhee, Hyun Sook
    Park, Jong Hwan
    Lee, Dong Noon
    INFORMATION SCIENCES, 2012, 205 : 93 - 109
  • [38] Password-Authenticated Public-Key Encryption
    Bradley, Tatiana
    Camenisch, Jan
    Jarecki, Stanislaw
    Lehmann, Anja
    Neven, Gregory
    Xu, Jiayu
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, ACNS 2019, 2019, 11464 : 442 - 462
  • [39] Scalable CCA-secure public-key authenticated encryption with keyword search from ideal lattices in cloud computing
    Yao, Lisha
    Weng, Jian
    Yang, Anjia
    Liang, Xiaojian
    Wu, Zhenghao
    Jiang, Zike
    Hou, Lin
    INFORMATION SCIENCES, 2023, 624 : 777 - 795
  • [40] A Public-key Encryption with Multi-keyword Search Scheme for Cloud-based Smart Grids
    Zhang, Dong
    Fan, Qing
    Qiao, Hongyi
    Luo, Min
    2021 IEEE CONFERENCE ON DEPENDABLE AND SECURE COMPUTING (DSC), 2021,