Security-enhanced public-key authenticated searchable encryption

被引:2
|
作者
Cheng, Leixiao [1 ,2 ]
Qin, Jing [1 ]
Feng, Feng [3 ]
Meng, Fei [4 ,5 ]
机构
[1] Shandong Univ, Sch Math, Jinan, Peoples R China
[2] Shandong Univ, Sch Cyber Sci & Technol, Qingdao, Peoples R China
[3] Ningxia Univ, Sch Informat Engn, Yinchuan, Peoples R China
[4] Yanqi Lake Beijing Inst Math Sci & Applicat, Beijing, Peoples R China
[5] Tsinghua Univ, Yau Math Sci Ctr, Beijing, Peoples R China
基金
中国国家自然科学基金;
关键词
PAEKS; Inside keyword guessing attacks; Fully MTI; Fully MCI; ATTRIBUTE-BASED ENCRYPTION; KEYWORD GUESSING ATTACKS; SCHEME;
D O I
10.1016/j.ins.2023.119454
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Public key authenticated encryption with keyword search (PAEKS) is an asymmetric searchable encryption technique secure against inside keyword guessing attacks. The security properties of PAEKS are modeled via ciphertext indistinguishability (CI) and trapdoor indistinguishability (TI). Nowadays, CI security has been extended to enable the attacker to challenge two keyword tuples (MCI security), and even obtain ciphertext embedded with any keyword (fully MCI security). However, similar extensions to TI security have not yet been achieved from bilinear pairings. In this work, we address this problem by focusing not only on ciphertext privacy, but also on trapdoor privacy. In particular, we adopt the enhanced TI-security, namely fully MTI security. We begin by conducting a detailed comparison of the fully MTI security with current TI models. Subsequently, we design a PAEKS scheme from bilinear pairings that initially achieves both fully MTI and fully MCI security, thereby offering a stronger security guarantee than other existing PAEKS schemes. To optimize the practical efficiency, we adopt various techniques: accelerating the online efficiency by shifting most computational cost offline; leveraging parallel computing to speed up the test algorithm. Consequently, our optimized scheme is competitive with other PAEKS schemes optimized using similar techniques.
引用
收藏
页数:10
相关论文
共 50 条
  • [1] Towards Enhanced Security for Certificateless Public-Key Authenticated Encryption with Keyword Search
    Liu, Xueqiao
    Li, Hongbo
    Yang, Guomin
    Susilo, Willy
    Tonien, Joseph
    Huang, Qiong
    [J]. PROVABLE SECURITY, PROVSEC 2019, 2019, 11821 : 113 - 129
  • [2] Certificateless Public Key Authenticated Searchable Encryption With Enhanced Security Model in IIoT Applications
    Cheng, Leixiao
    Meng, Fei
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2023, 10 (02): : 1391 - 1400
  • [3] Post-Quantum Public-Key Authenticated Searchable Encryption with Forward Security: General Construction, and Applications
    Xu, Shiyuan
    Cao, Yibo
    Chen, Xue
    Zhao, Yanmin
    Yiu, Siu-Ming
    [J]. INFORMATION SECURITY AND CRYPTOLOGY, INSCRYPT 2023, PT I, 2024, 14526 : 274 - 298
  • [4] Trapdoor security in a searchable public-key encryption scheme with a designated tester
    Rhee, Hyun Sook
    Park, Jong Hwan
    Susilo, Willy
    Lee, Dong Hoon
    [J]. JOURNAL OF SYSTEMS AND SOFTWARE, 2010, 83 (05) : 763 - 771
  • [5] Improved Security Model for Public-Key Authenticated Encryption with Keyword Search
    Qin, Baodong
    Cui, Hui
    Zheng, Xiaokun
    Zheng, Dong
    [J]. PROVABLE AND PRACTICAL SECURITY, PROVSEC 2021, 2021, 13059 : 19 - 38
  • [6] Security-Enhanced Network Coding Through Public-Key Cryptography
    Forutan, Vahid
    Fischer, Robert F. H.
    [J]. 2015 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2015, : 717 - 718
  • [7] Password-Authenticated Public-Key Encryption
    Bradley, Tatiana
    Camenisch, Jan
    Jarecki, Stanislaw
    Lehmann, Anja
    Neven, Gregory
    Xu, Jiayu
    [J]. APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, ACNS 2019, 2019, 11464 : 442 - 462
  • [8] An Efficient Searchable Public-Key Authenticated Encryption for Cloud-Assisted Medical Internet of Things
    Chi, Tianyu
    Qin, Baodong
    Zheng, Dong
    [J]. WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2020, 2020
  • [9] Public-key Authenticated Encryption with Keyword Search: Cryptanalysis, Enhanced Security, and Quantum-resistant Instantiation
    Liu, Zi-Yuan
    Tseng, Yi-Fan
    Tso, Raylin
    Mambo, Masahiro
    Chen, Yu-Chi
    [J]. ASIA CCS'22: PROCEEDINGS OF THE 2022 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2022, : 423 - 436
  • [10] Public-key authenticated encryption with keyword search revisited: Security model and constructions
    Qin, Baodong
    Chen, Yu
    Huang, Qiong
    Liu, Ximeng
    Zheng, Dong
    [J]. INFORMATION SCIENCES, 2020, 516 : 515 - 528