RLWE-based public key searchable encryption: securer, faster, and lower end-to-end delay for cloud computing

被引:0
|
作者
Qi, Lijun [1 ,2 ]
Zhuang, Jincheng [1 ,3 ]
机构
[1] Shandong Univ, Sch Cyber Sci & Technol, Qingdao, Peoples R China
[2] Shandong Univ, Key Lab Cryptol Technol & Informat Secur, Qingdao, Peoples R China
[3] Quan Cheng Lab, Jinan, Peoples R China
来源
JOURNAL OF SUPERCOMPUTING | 2024年 / 80卷 / 02期
关键词
Keyword searchable encryption; Authentication; Keyword guessing attacks; Ring-LWE; ISIS; KEYWORD SEARCH;
D O I
10.1007/s11227-023-05574-9
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud storage and computing offer significant convenience and management efficiency in the information era. Privacy protection is a major challenge in cloud computing. Public key encryption with keyword search (PEKS) is an ingenious tool for ensuring both privacy and functionality in certain scenarios, such as ensuring privacy for data retrieval appearing in cloud computing. Despite much attention received, PEKS schemes still face several challenges in practical applications, such as low computational efficiency, high end-to-end delay, vulnerability to inside keyword guessing attacks, and key management defects in multi-user scenarios. In this work, we first propose a post-quantum secure PEKS scheme in the standard model. The resulting PEKS scheme is based on Ring-LWE/ISIS assumptions. Then, we present two extended schemes. The first is a public-key authenticated encryption with keyword search scheme, which prevents servers from initiating inside keyword guessing attacks. The second is an identity-based public-key authenticated encryption with keyword search scheme, which reduces the complexity of key management in practical applications. Theoretical analyses prove that these schemes enjoy high security. Experimental results indicate that these schemes provide lower end-to-end delay and higher computational efficiency compared to similar ones.
引用
收藏
页码:2767 / 2798
页数:32
相关论文
共 23 条
  • [21] Multiocular Surveilance of Wide Dynamic Environments Based on Optical Vision, Event Modelling and End-to-End Data Encryption A cloud-based monitoring approach of maritime activities
    Ntalianis, Klimis
    Sardis, Emmanuel
    Tsapatsoulis, Nicolas
    Doulamis, Anastasios
    Rizomiliotis, Panagiotis
    2012 IEEE GLOBECOM WORKSHOPS (GC WKSHPS), 2012, : 742 - 746
  • [22] An error-tolerant keyword search scheme based on public-key encryption in secure cloud computing
    Bo, Yang
    Zhang, Mingwu
    Du, Jun-Qiang
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2016, 28 (04): : 1083 - 1093
  • [23] A Lightweight Blockchain-based Public-Key Authenticated Encryption with Multi-Keyword Search for Cloud Computing
    Du, Haorui
    Chen, Jianhua
    Lin, Fei
    Peng, Cong
    He, Debiao
    SECURITY AND COMMUNICATION NETWORKS, 2022, 2022