RLWE-based public key searchable encryption: securer, faster, and lower end-to-end delay for cloud computing

被引:0
|
作者
Qi, Lijun [1 ,2 ]
Zhuang, Jincheng [1 ,3 ]
机构
[1] Shandong Univ, Sch Cyber Sci & Technol, Qingdao, Peoples R China
[2] Shandong Univ, Key Lab Cryptol Technol & Informat Secur, Qingdao, Peoples R China
[3] Quan Cheng Lab, Jinan, Peoples R China
来源
JOURNAL OF SUPERCOMPUTING | 2024年 / 80卷 / 02期
关键词
Keyword searchable encryption; Authentication; Keyword guessing attacks; Ring-LWE; ISIS; KEYWORD SEARCH;
D O I
10.1007/s11227-023-05574-9
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud storage and computing offer significant convenience and management efficiency in the information era. Privacy protection is a major challenge in cloud computing. Public key encryption with keyword search (PEKS) is an ingenious tool for ensuring both privacy and functionality in certain scenarios, such as ensuring privacy for data retrieval appearing in cloud computing. Despite much attention received, PEKS schemes still face several challenges in practical applications, such as low computational efficiency, high end-to-end delay, vulnerability to inside keyword guessing attacks, and key management defects in multi-user scenarios. In this work, we first propose a post-quantum secure PEKS scheme in the standard model. The resulting PEKS scheme is based on Ring-LWE/ISIS assumptions. Then, we present two extended schemes. The first is a public-key authenticated encryption with keyword search scheme, which prevents servers from initiating inside keyword guessing attacks. The second is an identity-based public-key authenticated encryption with keyword search scheme, which reduces the complexity of key management in practical applications. Theoretical analyses prove that these schemes enjoy high security. Experimental results indicate that these schemes provide lower end-to-end delay and higher computational efficiency compared to similar ones.
引用
收藏
页码:2767 / 2798
页数:32
相关论文
共 23 条
  • [1] RLWE-based public key searchable encryption: securer, faster, and lower end-to-end delay for cloud computing
    Lijun Qi
    Jincheng Zhuang
    The Journal of Supercomputing, 2024, 80 : 2767 - 2798
  • [2] Public-Key Encryption Secure Against Related Randomness Attacks for Improved End-to-End Security of Cloud/Edge Computing
    Liu, Pengtao
    IEEE ACCESS, 2020, 8 : 16750 - 16759
  • [3] Efficient iNTRU-based public key authentication keyword searchable encryption in cloud computing
    Yao, Yunfei
    Chen, Huiyan
    Wang, Ke
    Yu, Haoyang
    Wang, Yu
    Wang, Qingnan
    JOURNAL OF SYSTEMS ARCHITECTURE, 2024, 154
  • [4] State-free End-to-End Encrypted Storage and Chat Systems based on Searchable Encryption
    Emura, Keita
    Ito, Ryoma
    Kanamori, Sachiko
    Nojima, Ryo
    Watanabe, Yohei
    ICEIS: PROCEEDINGS OF THE 24TH INTERNATIONAL CONFERENCE ON ENTERPRISE INFORMATION SYSTEMS - VOL 2, 2022, : 106 - 113
  • [5] End-to-End Post-Quantum Cryptography Encryption Protocol for Video Conferencing System Based on Government Public Key Infrastructure
    Park, Yeongjae
    Yoo, Hyeondo
    Ryu, Jieun
    Choi, Young-Rak
    Kang, Ju-Sung
    Yeom, Yongjin
    APPLIED SYSTEM INNOVATION, 2023, 6 (04)
  • [6] A Cloud-RAN based end-to-end computation offloading in Mobile Edge Computing
    Gholivand, Rezvan
    Movahedi, Zeinab
    COMPUTER COMMUNICATIONS, 2021, 175 : 193 - 204
  • [7] Workflow Scheduling Scheme for Optimized Reliability and End-to-End Delay Control in Cloud Computing Using AI-Based Modeling
    Khaleel, Mustafa Ibrahim
    Safran, Mejdl
    Alfarhood, Sultan
    Zhu, Michelle
    MATHEMATICS, 2023, 11 (20)
  • [8] Lattice-based searchable public-key encryption scheme for secure cloud storage
    Xie, Run
    Xu, Chunxiang
    He, Chanlian
    Zhang, Xiaojun
    INTERNATIONAL JOURNAL OF WEB AND GRID SERVICES, 2018, 14 (01) : 3 - 20
  • [9] Efficient Revocation on Identity based Encryption with Public Key Infrastructure in Cloud Computing
    Sale, Nitin
    Talhar, Nitin
    2017 INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION, CONTROL AND AUTOMATION (ICCUBEA), 2017,
  • [10] An Efficient Pairing-Free Certificateless Searchable Public Key Encryption for Cloud-Based IIoT
    Ma, Mimi
    Luo, Min
    Fan, Shuqin
    Feng, Dengguo
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2020, 2020