Scalable CCA-secure public-key authenticated encryption with keyword search from ideal lattices in cloud computing

被引:13
|
作者
Yao, Lisha [1 ]
Weng, Jian [1 ]
Yang, Anjia [1 ]
Liang, Xiaojian [1 ]
Wu, Zhenghao [1 ]
Jiang, Zike [1 ]
Hou, Lin [1 ]
机构
[1] Jinan Univ, Coll Cyber Secur, Coll Informat Sci & Technol, Guangzhou 510632, Peoples R China
基金
国家重点研发计划; 中国国家自然科学基金;
关键词
Public-key authenticated encryption with; keyword search; Ideal lattices; Ring-LWE; Ring-ISIS; EFFICIENT; IMPLEMENTATION; INTERNET;
D O I
10.1016/j.ins.2022.12.035
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Public-key authenticated encryption with keyword search (PAEKS) is an important cryptographic primitive for realizing effective and confidential searches on encrypted data in cloud computing. Several PAEKS schemes with various appealing functionalities have been proposed in the literature. Nevertheless, most of them are based on the classical numbertheoretic assumptions and are impossible to resist quantum attacks. Their security is only proven against chosen-keyword attacks and is considered insufficient. Fortunately, ringLWE and ring-ISIS problems reduced from the worst-case ideal lattices are believed to be post-quantum secure and could be improved computational efficiency in constructions. In this paper, we propose a scalable PAEKS scheme based on ring-LWE and ring-ISIS by adopting the ring analog of lattice algorithms of both digital signature and searchable encryption schemes, in which signature algorithms are used to authenticate ciphertext, making our PAEKS resistant to insider keyword guessing attacks. The scheme is also proved secure against chosen-ciphertext attacks and token privacy attacks. In addition, we extend the PAEKS scheme to conjunctive keywords and multi-user settings to allow for realistic promotion. We finally implement our schemes and compare them with related counterparts, which shows that our constructions are efficient in practical applications. (c) 2022 Elsevier Inc. All rights reserved.
引用
收藏
页码:777 / 795
页数:19
相关论文
共 50 条
  • [41] A New Framework of IND-CCA Secure Public Key Encryption with Keyword Search
    Ma, Sha
    Huang, Qiong
    COMPUTER JOURNAL, 2020, 63 (12): : 1849 - 1858
  • [42] Efficient public key encryption with revocable keyword search in cloud computing
    Jianhong Zhang
    Jian Mao
    Cluster Computing, 2016, 19 : 1211 - 1217
  • [43] Efficient public key encryption with revocable keyword search in cloud computing
    Zhang, Jianhong
    Mao, Jian
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2016, 19 (03): : 1211 - 1217
  • [44] New leakage-resilient CCA-secure public key encryption
    Kurosawa, Kaoru
    Nojima, Ryo
    Phong, Le Trieu
    JOURNAL OF MATHEMATICAL CRYPTOLOGY, 2013, 7 (04) : 297 - 312
  • [45] A lattice-based designated-server public-key authenticated encryption with keyword search
    Fan, Yajun
    Qin, Baodong
    Zheng, Dong
    JOURNAL OF SYSTEMS ARCHITECTURE, 2023, 145
  • [46] Single-Server Public-Key Authenticated Encryption With Keyword Search and Its Application in IIoT
    Zhou, Xiaotong
    He, Debiao
    Ning, Jianting
    Luo, Min
    Huang, Xinyi
    IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, 2024, 11 (01): : 404 - 415
  • [47] Public-Key Encryption With Keyword Search via Obfuscation
    Hu, Chengyu
    Liu, Pengtao
    Yang, Rupeng
    Xu, Yan
    IEEE ACCESS, 2019, 7 : 37394 - 37405
  • [48] User-Friendly Public-Key Authenticated Encryption With Keyword Search for Industrial Internet of Things
    Pu, Lang
    Lin, Chao
    Chen, Biwen
    He, Debiao
    IEEE INTERNET OF THINGS JOURNAL, 2023, 10 (15) : 13544 - 13555
  • [49] Public-Key Encryption with Fuzzy Keyword Search: A Provably Secure Scheme under Keyword Guessing Attack
    Xu, Peng
    Jin, Hai
    Wu, Qianhong
    Wang, Wei
    IEEE TRANSACTIONS ON COMPUTERS, 2013, 62 (11) : 2266 - 2277
  • [50] Compact Authenticated Key Exchange from Bounded CCA-Secure KEM
    Yoneyama, Kazuki
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2015, E98A (01) : 132 - 143