dMCLAEKS: Pairing-free designated-tester multi-recipient certificateless authenticated encryption with keyword search for concealing search patterns

被引:1
|
作者
Sun, Liwang [1 ]
Cao, Zhenfu [1 ,2 ]
Dong, Xiaolei [1 ,2 ]
Shen, Jiachen [1 ]
Wang, Miao [1 ]
Chen, Jiasheng [1 ]
机构
[1] East China Normal Univ, Shanghai Key Lab Trustworthy Comp, Shanghai 200062, Peoples R China
[2] Res Ctr Basic Theories Intelligent Comp, Zhejiang Lab, Res Inst Basic Theories, Hangzhou 311121, Peoples R China
基金
中国国家自然科学基金;
关键词
Searchable encryption; Search pattern; Inside keyword guessing attack; Certificateless cryptography; CLAEKS; IIoT; PUBLIC-KEY ENCRYPTION; INDUSTRIAL INTERNET; SYSTEMS; IIOT;
D O I
10.1016/j.sysarc.2023.103007
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Modern Industrial Internet of Things (IIoT) technologies, such as smart grids, 5G-enabled unmanned aerial vehicles (UAV), and supply chain 4.0, can be leveraged to promote intelligent management. Yet, IIoT systems create enormous volumes of data that must be outsourced to the cloud for storage and to provide end-users with search capabilities. The outsourcing of IIoT data to a third-party cloud service provider (CSP) creates a number of data leakage issues. Recently, Certificateless Authenticated Encryption with Keyword Search (CLAEKS) was proposed to address the issue of encrypted data querying in cloud-assisted IIoT. But so far, the majority of existing techniques depend on expensive bilinear pairing, and they are all single-receiver. In addition, these methods are extremely vulnerable to keyword guessing attacks and do not hide the search pattern, making it simple for an attacker to deduce the search content. In this paper, we present a rapid and trustworthy designed-tester multi-recipient CLAEKS (dMCLAEKS) protocol with the numerous advantages: (1) no expensive bilinear pairing procedures; (2) supporting for ciphertexts with multiple recipients; (3) defending against Inside Keyword Guess Attacks (IKGA); (4) incapability to determine search pattern. A comparative between our suggested scheme and other similar schemes is also offered to demonstrate that the proposed method is stronger overall.
引用
收藏
页数:10
相关论文
共 19 条
  • [1] Pairing-free certificateless authenticated encryption with keyword search
    Shiraly, Danial
    Pakniat, Nasrollah
    Noroozi, Mahnaz
    Eslami, Ziba
    JOURNAL OF SYSTEMS ARCHITECTURE, 2022, 124
  • [2] LMCLAEKS: LWE-assisted multi-recipient certificateless authenticated encryption with keyword search
    Sun, Liwang
    Cao, Zhenfu
    Dong, Xiaolei
    Shen, Jiachen
    INFORMATION SCIENCES, 2023, 648
  • [3] Designated tester certificateless encryption with keyword search
    Pakniat, Nasrollah
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2019, 49
  • [4] Constructing pairing-free certificateless public key encryption with keyword search
    Yang Lu
    Ji-guo Li
    Frontiers of Information Technology & Electronic Engineering, 2019, 20 : 1049 - 1060
  • [5] Constructing pairing-free certificateless public key encryption with keyword search
    Lu, Yang
    Li, Ji-guo
    FRONTIERS OF INFORMATION TECHNOLOGY & ELECTRONIC ENGINEERING, 2019, 20 (08) : 1049 - 1060
  • [6] Designated-tester Identity-Based Authenticated Encryption with Keyword Search with applications in cloud systems
    Shiraly, Danial
    Eslami, Ziba
    Pakniat, Nasrollah
    JOURNAL OF SYSTEMS ARCHITECTURE, 2024, 152
  • [7] Pairing-free public-key authenticated encryption with keyword search
    Bai, Lisha
    Yong, Lei
    Chen, Zhixian
    Shao, Jun
    COMPUTER STANDARDS & INTERFACES, 2024, 88
  • [8] Designated Server Certificateless Deniably Authenticated Encryption With Keyword Search
    Zhang, Yulei
    Wen, Long
    Zhang, Yongjie
    Wang, Caifen
    IEEE ACCESS, 2019, 7 : 146542 - 146551
  • [9] Multi-Recipient encryption with keyword search without pairing for cloud storage
    Yang, Ningbin
    Zhou, Quan
    Huang, Qiong
    Tang, Chunming
    JOURNAL OF CLOUD COMPUTING-ADVANCES SYSTEMS AND APPLICATIONS, 2022, 11 (01):
  • [10] Multi-Recipient encryption with keyword search without pairing for cloud storage
    Ningbin Yang
    Quan Zhou
    Qiong Huang
    Chunming Tang
    Journal of Cloud Computing, 11