Scalable CCA-secure public-key authenticated encryption with keyword search from ideal lattices in cloud computing

被引:13
|
作者
Yao, Lisha [1 ]
Weng, Jian [1 ]
Yang, Anjia [1 ]
Liang, Xiaojian [1 ]
Wu, Zhenghao [1 ]
Jiang, Zike [1 ]
Hou, Lin [1 ]
机构
[1] Jinan Univ, Coll Cyber Secur, Coll Informat Sci & Technol, Guangzhou 510632, Peoples R China
基金
国家重点研发计划; 中国国家自然科学基金;
关键词
Public-key authenticated encryption with; keyword search; Ideal lattices; Ring-LWE; Ring-ISIS; EFFICIENT; IMPLEMENTATION; INTERNET;
D O I
10.1016/j.ins.2022.12.035
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Public-key authenticated encryption with keyword search (PAEKS) is an important cryptographic primitive for realizing effective and confidential searches on encrypted data in cloud computing. Several PAEKS schemes with various appealing functionalities have been proposed in the literature. Nevertheless, most of them are based on the classical numbertheoretic assumptions and are impossible to resist quantum attacks. Their security is only proven against chosen-keyword attacks and is considered insufficient. Fortunately, ringLWE and ring-ISIS problems reduced from the worst-case ideal lattices are believed to be post-quantum secure and could be improved computational efficiency in constructions. In this paper, we propose a scalable PAEKS scheme based on ring-LWE and ring-ISIS by adopting the ring analog of lattice algorithms of both digital signature and searchable encryption schemes, in which signature algorithms are used to authenticate ciphertext, making our PAEKS resistant to insider keyword guessing attacks. The scheme is also proved secure against chosen-ciphertext attacks and token privacy attacks. In addition, we extend the PAEKS scheme to conjunctive keywords and multi-user settings to allow for realistic promotion. We finally implement our schemes and compare them with related counterparts, which shows that our constructions are efficient in practical applications. (c) 2022 Elsevier Inc. All rights reserved.
引用
收藏
页码:777 / 795
页数:19
相关论文
共 50 条
  • [31] Public-Key Authenticated Encryption With Keyword Search Supporting Constant Trapdoor Generation and Fast Search
    Li, Hongbo
    Huang, Qiong
    Huang, Jianye
    Susilo, Willy
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2023, 18 : 396 - 410
  • [32] Public-Key Encryption with Registered Keyword Search
    Tang, Qiang
    Chen, Liqun
    PUBLIC KEY INFRASTRUCTURES, SERVICES AND APPLICATIONS, 2010, 6391 : 163 - +
  • [33] Re-PAEKS: Public-Key Authenticated Re-Encryption With Keyword Search
    Luo, Fucai
    Wang, Haiyan
    Yan, Xingfu
    IEEE TRANSACTIONS ON MOBILE COMPUTING, 2024, 23 (10) : 10077 - 10092
  • [34] Public key encryption with conjunctive keyword search secure against keyword guessing attack from lattices
    Mao, Yaojun
    Fu, Xingbing
    Guo, Chen
    Wu, Guohua
    TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2019, 30 (11)
  • [35] Public-key encryption with keyword search secure against continual memory attacks
    Hu, Chengyu
    Yang, Rupeng
    Liu, Pengtao
    Yu, Zuoxia
    Zhou, Yongbin
    Xu, Qiuliang
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (11) : 1613 - 1629
  • [36] Chosen-Ciphertext Attack Secure Public-Key Encryption with Keyword Search
    Rhee, Hyun Sook
    CMC-COMPUTERS MATERIALS & CONTINUA, 2022, 73 (01): : 69 - 85
  • [37] Efficient KDM-CCA Secure Public-Key Encryption via Auxiliary-Input Authenticated Encryption
    Han, Shuai
    Liu, Shengli
    Lyu, Lin
    SECURITY AND COMMUNICATION NETWORKS, 2017,
  • [38] An efficient CCA-secure cryptosystem over ideal lattices from identity-based encryption
    Yang Xiao-yuan
    Wu Li-qiang
    Zhang Min-qing
    Chen Xiao-feng
    COMPUTERS & MATHEMATICS WITH APPLICATIONS, 2013, 65 (09) : 1254 - 1263
  • [39] Public key authenticated encryption with keyword search: revisited
    Noroozi, Mahnaz
    Eslami, Ziba
    IET INFORMATION SECURITY, 2019, 13 (04) : 336 - 342
  • [40] Simpler CCA-Secure Public Key Encryption from Lossy Trapdoor Functions
    Liang, Bei
    Zhang, Rui
    Li, Hongda
    INFORMATION SECURITY AND CRYPTOLOGY (INSCRYPT 2014), 2015, 8957 : 193 - 206