Verifiable and Searchable Symmetric Encryption Scheme Based on the Public Key Cryptosystem

被引:0
|
作者
Duan, Gangqiang [1 ]
Li, Shuai [1 ]
机构
[1] Ningxia Univ, Sch Informat Engn, Yinchuan 750021, Peoples R China
关键词
Internet of Things; cloud computing; verifiable; searchable; symmetric encryption; public key cryptosystem; KEYWORD RANKED SEARCH; CLOUD;
D O I
10.3390/electronics12183965
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the rapid development of Internet of Things technology and cloud computing technology, all industries need to outsource massive data to third-party clouds for storage in order to reduce storage and computing costs. Verifiable and dynamic searchable symmetric encryption is a very important cloud security technology, which supports the dynamic update of private data and allows users to perform search operations on the cloud server and verify the legitimacy of the returned results. Therefore, how to realize the dynamic search of encrypted cloud data and the effective verification of the results returned by the cloud server is a key problem to be solved. To solve this problem, we propose a verifiable dynamic encryption scheme (v-PADSSE) based on the public key cryptosystem. In order to achieve efficient and correct data updating, the scheme designs verification information (VI) for each keyword and constructs a verification list (VL) to store it. When dynamic update operations are performed on the cloud data, it is easy to quickly update the security index through obtaining the latest verification information in the VL. The safety and performance evaluation of the v-PADSSE scheme proved that the scheme is safe and effective.
引用
收藏
页数:25
相关论文
共 50 条
  • [41] A Lightweight Certificateless Searchable Public Key Encryption Scheme for Medical Internet of Things
    Liu, Xiaoguang
    Sun, Yingying
    Dong, Hao
    [J]. FRONTIERS IN CYBER SECURITY, FCS 2022, 2022, 1726 : 69 - 86
  • [42] An enhanced heterogeneous public key searchable encryption scheme supporting multiple keywords
    Luo, Ming
    Huang, Dashi
    Qiu, Minrong
    [J]. PEER-TO-PEER NETWORKING AND APPLICATIONS, 2023, 16 (01) : 383 - 394
  • [43] An enhanced searchable public key encryption scheme with a designated tester and its extensions
    Hu, Chengyu
    Liu, Pengtao
    [J]. JOURNAL OF COMPUTERS, 2012, 7 (03) : 716 - 723
  • [44] Secure searchable public key encryption scheme against keyword guessing attacks
    Rhee, Hyun Sook
    Susilo, Willy
    Kim, Hyun-Jeong
    [J]. IEICE ELECTRONICS EXPRESS, 2009, 6 (05): : 237 - 243
  • [45] Trapdoor security in a searchable public-key encryption scheme with a designated tester
    Rhee, Hyun Sook
    Park, Jong Hwan
    Susilo, Willy
    Lee, Dong Hoon
    [J]. JOURNAL OF SYSTEMS AND SOFTWARE, 2010, 83 (05) : 763 - 771
  • [46] Author Correction: An image encryption scheme based on public key cryptosystem and quantum logistic map
    Guodong Ye
    Kaixin Jiao
    Xiaoling Huang
    Bok‑Min Goi
    Wun‑She Yap
    [J]. Scientific Reports, 11
  • [47] A pairing-free certificateless searchable public key encryption scheme for IoMT
    Liu, Xiaoguang
    Sun, Yingying
    Dong, Hao
    [J]. JOURNAL OF SYSTEMS ARCHITECTURE, 2023, 139
  • [48] A Fast Public Key Searchable Encryption Scheme Against Inside Keyword Attacks
    Liu, Can
    Chen, Ningjiang
    Huang, Ruwei
    Xie, Yongsheng
    [J]. COMPUTER SUPPORTED COOPERATIVE WORK AND SOCIAL COMPUTING, CHINESECSCW 2019, 2019, 1042 : 50 - 64
  • [49] A threshold key escrow scheme based on public key cryptosystem
    Zhenfu Cao
    [J]. Science in China Series E: Technological Sciences, 2001, 44 : 441 - 448
  • [50] A threshold key escrow scheme based on public key cryptosystem
    曹珍富
    [J]. Science China Technological Sciences, 2001, (04) : 441 - 448