A more efficient public-key authenticated encryption scheme with keyword search

被引:13
|
作者
Huang, Qiong [1 ,2 ]
Huang, Peisen [1 ]
Li, Hongbo [1 ]
Huang, Jianye [3 ]
Lin, Hongyuan [1 ]
机构
[1] South China Agr Univ, Coll Math & Informat, Guangzhou 510642, Peoples R China
[2] Guangzhou Key Lab Intelligent Agr, Guangzhou 510642, Peoples R China
[3] Univ Wollongong, Sch Comp & Informat Technol, Wollongong, NSW 2500, Australia
基金
中国国家自然科学基金;
关键词
Keyword search; Inside keyword guessing attacks; Low storage overhead; Inverted index; Fast search; GUESSING ATTACKS; SECURE; INTERNET;
D O I
10.1016/j.sysarc.2023.102839
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
To realize ciphertext retrieval without decryption in the public key settings, Boneh et al. in 2004 proposed a cryptographic primitive named Public-key Encryption with Keyword Search (PEKS) and proposed the first PEKS scheme. Following Boneh et al.'s work, various PEKS schemes were proposed; however, most schemes are vulnerable to inside keyword guessing attacks (IKGA). Huang and Li proposed a new primitive named Public -key Authenticated Encryption with Keyword Search (PAEKS) in 2017, which resists the IKGA in the setting of only one test server. Their main idea to resist IKGA is to require the data sender to authenticate the ciphertext while encrypting a keyword. However, in the era of big data, as the number of encrypted files increases, huge storage overhead and heavy retrieval costs become problems in PAEKS. In this paper, we proposed a new PAEKS scheme that costs low storage space and supports fast search. We introduced the ciphertext deduplication into PAEKS to reduce storage space and leveraged the inverted index to accelerate the retrieval process. We simulated the proposed scheme and several related schemes with a desktop computer. The experiment results show that our proposed scheme is of lower storage overhead and higher retrieval efficiency compared with related schemes.
引用
收藏
页数:8
相关论文
共 50 条
  • [41] IsoqurPEKS: An Isogeny-Based Quantum-Resistant Public-Key Encryption Scheme with Keyword Search
    Fan, Qing
    Luo, Min
    Peng, Cong
    Wang, Lianhai
    He, Debiao
    Cui, Jie
    SECURITY AND COMMUNICATION NETWORKS, 2022, 2022
  • [42] Public-key authenticated encryption with keyword search achieving both multi-ciphertext and multi-trapdoor indistinguishability
    Pan, Xiangyu
    Li, Fagen
    JOURNAL OF SYSTEMS ARCHITECTURE, 2021, 115
  • [43] A new construction of public key authenticated encryption with keyword search based on LWE
    Wang, Ziqing
    Li, Jin
    Liu, Xiaoguang
    Wu, Xinyan
    Li, Fagen
    TELECOMMUNICATION SYSTEMS, 2024, 86 (02) : 229 - 240
  • [44] An error-tolerant keyword search scheme based on public-key encryption in secure cloud computing
    Bo, Yang
    Zhang, Mingwu
    Du, Jun-Qiang
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2016, 28 (04): : 1083 - 1093
  • [45] Certificateless Public Key Authenticated Encryption With Keyword Search or Industrial Internet of Things
    He, Debiao
    Ma, Mimi
    Zeadally, Sherali
    Kumar, Neeraj
    Liang, Kaitai
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2018, 14 (08) : 3618 - 3627
  • [46] Certificateless Public Key Authenticated Encryption with Keyword Search Achieving Stronger Security
    Lu, Jingwei
    Li, Hongbo
    Huang, Jianye
    Ma, Sha
    Au, Man Ho Allen
    Huang, Qiong
    INFORMATION, 2023, 14 (03)
  • [47] Generic Construction of Forward Secure Public Key Authenticated Encryption with Keyword Search
    Emura, Keita
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, ACNS 2024, PT I, 2024, 14583 : 237 - 256
  • [48] Provably Secure Public Key Authenticated Encryption with Keyword Search Based on SGX
    Liu Y.
    Qin G.
    Liu P.
    Hu C.
    Guo S.
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2023, 60 (12): : 2709 - 2724
  • [49] Key-Updatable Public-Key Encryption with Keyword Search: Models and Generic Constructions
    Anada, Hiroaki
    Kanaoka, Akira
    Matsuzaki, Natsume
    Watanabe, Yohei
    INFORMATION SECURITY AND PRIVACY, 2018, 10946 : 341 - 359
  • [50] Public-key encryption with keyword search secure against continual memory attacks
    Hu, Chengyu
    Yang, Rupeng
    Liu, Pengtao
    Yu, Zuoxia
    Zhou, Yongbin
    Xu, Qiuliang
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (11) : 1613 - 1629