Scalable CCA-secure public-key authenticated encryption with keyword search from ideal lattices in cloud computing

被引:13
|
作者
Yao, Lisha [1 ]
Weng, Jian [1 ]
Yang, Anjia [1 ]
Liang, Xiaojian [1 ]
Wu, Zhenghao [1 ]
Jiang, Zike [1 ]
Hou, Lin [1 ]
机构
[1] Jinan Univ, Coll Cyber Secur, Coll Informat Sci & Technol, Guangzhou 510632, Peoples R China
基金
国家重点研发计划; 中国国家自然科学基金;
关键词
Public-key authenticated encryption with; keyword search; Ideal lattices; Ring-LWE; Ring-ISIS; EFFICIENT; IMPLEMENTATION; INTERNET;
D O I
10.1016/j.ins.2022.12.035
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Public-key authenticated encryption with keyword search (PAEKS) is an important cryptographic primitive for realizing effective and confidential searches on encrypted data in cloud computing. Several PAEKS schemes with various appealing functionalities have been proposed in the literature. Nevertheless, most of them are based on the classical numbertheoretic assumptions and are impossible to resist quantum attacks. Their security is only proven against chosen-keyword attacks and is considered insufficient. Fortunately, ringLWE and ring-ISIS problems reduced from the worst-case ideal lattices are believed to be post-quantum secure and could be improved computational efficiency in constructions. In this paper, we propose a scalable PAEKS scheme based on ring-LWE and ring-ISIS by adopting the ring analog of lattice algorithms of both digital signature and searchable encryption schemes, in which signature algorithms are used to authenticate ciphertext, making our PAEKS resistant to insider keyword guessing attacks. The scheme is also proved secure against chosen-ciphertext attacks and token privacy attacks. In addition, we extend the PAEKS scheme to conjunctive keywords and multi-user settings to allow for realistic promotion. We finally implement our schemes and compare them with related counterparts, which shows that our constructions are efficient in practical applications. (c) 2022 Elsevier Inc. All rights reserved.
引用
收藏
页码:777 / 795
页数:19
相关论文
共 50 条
  • [21] Lightweight Multi-User Public-Key Authenticated Encryption With Keyword Search
    Xu, Yongliang
    Cheng, Hang
    Li, Jiguo
    Liu, Ximeng
    Zhang, Xinpeng
    Wang, Meiqing
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2025, 20 : 3234 - 3246
  • [22] Provably secure public-key encryption with conjunctive and subset keyword search
    Farras, Oriol
    Ribes-Gonzalez, Jordi
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2019, 18 (05) : 533 - 548
  • [23] Provably secure public-key encryption with conjunctive and subset keyword search
    Oriol Farràs
    Jordi Ribes-González
    International Journal of Information Security, 2019, 18 : 533 - 548
  • [24] Public-Key Encryption with Keyword Search from Lattice
    Hou, Changjiang
    Liu, Fei
    Bai, Hongtao
    Ren, Lanfang
    2013 EIGHTH INTERNATIONAL CONFERENCE ON P2P, PARALLEL, GRID, CLOUD AND INTERNET COMPUTING (3PGCIC 2013), 2013, : 336 - 339
  • [25] Provably Secure Public Key Authenticated Encryption with Keyword Search Based on SGX
    Liu Y.
    Qin G.
    Liu P.
    Hu C.
    Guo S.
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2023, 60 (12): : 2709 - 2724
  • [26] An Efficient and Secure Public Key Authenticated Encryption With Keyword Search in the Logarithmic Time
    Han, Lidong
    Guo, Junling
    Yang, Guang
    Xie, Qi
    Tian, Chengliang
    IEEE ACCESS, 2021, 9 : 151245 - 151253
  • [27] Generic Construction of Forward Secure Public Key Authenticated Encryption with Keyword Search
    Emura, Keita
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, ACNS 2024, PT I, 2024, 14583 : 237 - 256
  • [28] Leakage-Flexible CCA-secure Public-Key Encryption: Simple Construction and Free of Pairing
    Qin, Baodong
    Liu, Shengli
    PUBLIC-KEY CRYPTOGRAPHY - PKC 2014, 2014, 8383 : 19 - 36
  • [29] Public Key Authenticated Encryption with Keyword Search from LWE
    Cheng, Leixiao
    Meng, Fei
    COMPUTER SECURITY - ESORICS 2022, PT I, 2022, 13554 : 303 - 324
  • [30] Public-Key Encryption with Integrated Keyword Search
    Vishal Saraswat
    Rajeev Anand Sahu
    Gaurav Sharma
    Veronika Kuchta
    Olivier Markowitch
    Journal of Hardware and Systems Security, 2019, 3 (1) : 12 - 25