Lattice-Based Public Key Searchable Encryption from Experimental Perspectives

被引:49
|
作者
Behnia, Rouzbeh [1 ]
Ozmen, Muslum Ozgur [1 ]
Yavuz, Attila Altay [2 ]
机构
[1] Oregon State Univ, Dept Elect Engn & Comp Sci, Corvallis, OR 97331 USA
[2] Univ S Florida, Dept Comp Sci & Engn, Tampa, FL 33620 USA
关键词
Electronic mail; Encryption; Servers; Delays; Receivers; Applied cryptography; public key encryption with keyword search (PEKS); lattice-based cryptography; searchable ecnryption; KEYWORD GUESSING ATTACKS; SECURE; SIGNATURES; SCHEMES;
D O I
10.1109/TDSC.2018.2867462
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Public key Encryption with Keyword Search (PEKS) aims in mitigating the impacts of data privacy versus utilization dilemma by allowing any user in the system to send encrypted files to the server to be searched by a receiver. The receiver can retrieve the encrypted files containing specific keywords by providing the corresponding trapdoors of these keywords to the server. Despite their merits, the existing PEKS schemes introduce a high end-to-end delay that may hinder their adoption in practice. Moreover, they do not scale well for large security parameters and provide no post-quantum security promises. In this paper, we propose two novel lattice-based PEKS schemes that offer a high computational efficiency along with better security assurances than that of the existing alternatives. Specifically, our NTRU-PEKS scheme achieves 18 times lower end-to-end delay than the most efficient pairing-based alternatives. Our LWE-PEKS offers provable security in the standard model with a reduction to the worst-case lattice problems. We fully implemented our NTRU-PEKS scheme and benchmarked its performance as deployed on Amazon Web Services cloud infrastructures.
引用
收藏
页码:1269 / 1282
页数:14
相关论文
共 50 条
  • [21] Lattice-Based Searchable Encryption Scheme against Inside Keywords Guessing Attack
    Yu, Xiaoling
    Xu, Chungen
    Xu, Lei
    Wang, Yuntao
    [J]. CMC-COMPUTERS MATERIALS & CONTINUA, 2020, 64 (02): : 1107 - 1125
  • [22] Lattice-based searchable encryption scheme against inside keywords guessing attack
    Yu X.
    Xu C.
    Xu L.
    Wang Y.
    [J]. Computers, Materials and Continua, 2020, 64 (02): : 1107 - 1125
  • [23] A lattice-based efficient certificateless public key encryption for big data security in clouds
    Li, Juyan
    Yan, Mingyan
    Peng, Jialiang
    Huang, Haodong
    El-Latif, Ahmed A. Abd
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2024, 158 : 255 - 266
  • [24] Towards Efficient Implementation of Lattice-Based Public-Key Encryption on Modern CPUs
    Du, Chaohui
    Bai, Guoqiang
    Chen, Hongyi
    [J]. 2015 IEEE TRUSTCOM/BIGDATASE/ISPA, VOL 1, 2015, : 1230 - 1236
  • [25] A lattice-based public-key cryptosystem
    Cai, JY
    Cusick, TW
    [J]. INFORMATION AND COMPUTATION, 1999, 151 (1-2) : 17 - 31
  • [26] Public key encryption with searchable keywords based on Jacobi symbols
    Di Crescenzo, Giovanni
    Saraswat, Vishal
    [J]. PROGRESS IN CRYPTOLOGY - INDOCRYPT 2007, 2007, 4859 : 282 - 296
  • [27] A lattice-based public-key cryptosystem
    Cai, JY
    Cusick, TW
    [J]. SELECTED AREAS IN CRYPTOGRAPHY, 1999, 1556 : 219 - 233
  • [28] Chosen-ciphertext lattice-based public key encryption with equality test in standard model
    Dung Hoang Duong
    Roy, Partha Sarathi
    Susilo, Willy
    Fukushima, Kazuhide
    Kiyomoto, Shinsaku
    Sipasseuth, Arnaud
    [J]. THEORETICAL COMPUTER SCIENCE, 2022, 905 : 31 - 53
  • [29] A lattice-based designated-server public-key authenticated encryption with keyword search
    Fan, Yajun
    Qin, Baodong
    Zheng, Dong
    [J]. JOURNAL OF SYSTEMS ARCHITECTURE, 2023, 145
  • [30] Lattice-based completely non-malleable public-key encryption in the standard model
    Sepahi, Reza
    Steinfeld, Ron
    Pieprzyk, Josef
    [J]. DESIGNS CODES AND CRYPTOGRAPHY, 2014, 71 (02) : 293 - 313