Lattice-based proxy-oriented identity-based encryption with keyword search for cloud storage

被引:71
|
作者
Zhang, Xiaojun [1 ,2 ,3 ]
Tang, Yao [1 ]
Wang, Huaxiong [2 ]
Xu, Chunxiang [3 ]
Miao, Yinbin [2 ,4 ]
Cheng, Hang [2 ,5 ]
机构
[1] Southwest Petr Univ, Sch Comp Sci, Res Ctr Cyber Secur, Chengdu 610500, Sichuan, Peoples R China
[2] Nanyang Technol Univ, Sch Phys & Math Sci, Singapore, Singapore
[3] Univ Elect Sci & Technol China, Sch Comp Sci & Engn, Ctr Cyber Secur, Chengdu 611731, Sichuan, Peoples R China
[4] Xidian Univ, Sch Cyber Engn, Xian 710071, Shaanxi, Peoples R China
[5] Fuzhou Univ, Coll Math & Comp Sci, Fuzhou 350108, Fujian, Peoples R China
基金
新加坡国家研究基金会; 中国博士后科学基金; 国家重点研发计划; 中国国家自然科学基金;
关键词
Proxy-oriented; Identity-based encryption; Keyword search; Lattices; Post-quantum secure; Inside keyword guessing attacks; PUBLIC-KEY ENCRYPTION; RE-ENCRYPTION; SECURITY; PRIVACY; SCHEME; DECRYPTION; DATABASE;
D O I
10.1016/j.ins.2019.04.051
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Public-key encryption with keyword search (PEKS) enables users to search over encrypted data and retrieve target data efficiently. However, most of existing PEKS schemes are vulnerable to adversaries equipped with quantum computers in the near future, and even incur complex certificate management procedures due to the public key infrastructure (PKI). To this end, we propose a proxy-oriented identity-based encryption with keyword search (PO-IBEKS) scheme from lattices for cloud storage, which is post-quantum secure. In PO-IBEKS, an original data owner authorizes a proxy to encrypt sensitive data as well as corresponding keywords and upload ciphertexts to clouds, which alleviates the data processing burden on the original data owner. Besides, PO-IBEKS can resist inside keyword guessing attacks (IKGA) from misbehaved cloud servers by integrating the learning with errors (LWE) encryption and preimage sampleable function. Each entity in PO-IBEKS is identified with her/his recognizable information, thereby eliminating managing certificates. Formal security analysis proves that PO-IBEKS can achieve ciphertext indistinguishability, existential unforgeability, and delegation security. Experimental results demonstrate PO-IBEKS is much more practical when compared with existing schemes. (C) 2019 Elsevier Inc. All rights reserved.
引用
收藏
页码:193 / 207
页数:15
相关论文
共 50 条
  • [1] Improved identity-based proxy-oriented outsourcing with public auditing for secure cloud storage
    Cui, Yuanyou
    Su, Yunxuan
    Tu, Zheng
    Zhang, Jindan
    [J]. INTERNATIONAL JOURNAL OF GRID AND UTILITY COMPUTING, 2023, 14 (05) : 469 - 479
  • [2] Identity-Based Encryption with Keyword Search from Lattice Assumption
    Xiaojun Zhang
    Chunxiang Xu
    Liming Mu
    Jie Zhao
    [J]. China Communications, 2018, 15 (04) : 164 - 178
  • [3] Identity-Based Encryption with Keyword Search from Lattice Assumption
    Zhang, Xiaojun
    Xu, Chunxiang
    Mu, Liming
    Zhao, Jie
    [J]. CHINA COMMUNICATIONS, 2018, 15 (04) : 164 - 178
  • [4] Verifiable Identity-Based Encryption with Keyword Search for IoT from Lattice
    Mei, Lin
    Xu, Chungen
    Xu, Lei
    Yu, Xiaoling
    Zuo, Cong
    [J]. CMC-COMPUTERS MATERIALS & CONTINUA, 2021, 68 (02): : 2299 - 2314
  • [5] Lattice-Based Revocable Identity-Based Proxy Re-encryption with Re-encryption Verifiability
    Wang, Xiaolei
    Wang, Yang
    Wang, Mingqiang
    [J]. WIRELESS ALGORITHMS, SYSTEMS, AND APPLICATIONS (WASA 2022), PT I, 2022, 13471 : 535 - 544
  • [6] Identity-Based Unidirectional Proxy Re-encryption in Standard Model: A Lattice-Based Construction
    Dutta, Priyanka
    Susilo, Willy
    Duong, Dung Hoang
    Baek, Joonsang
    Roy, Partha Sarathi
    [J]. INFORMATION SECURITY APPLICATIONS, WISA 2020, 2020, 12583 : 245 - 257
  • [7] Identity-Based Proxy-Oriented Data Uploading and Remote Data Integrity Checking in Public Cloud
    Wang, Huaqun
    He, Debiao
    Tang, Shaohua
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2016, 11 (06) : 1165 - 1176
  • [8] Lattice-Based Identity-Based Homomorphic Conditional Proxy Re-Encryption for Secure Big Data Computing in Cloud Environment
    Ma, Chunguang
    Li, Juyan
    Ouyang, Weiping
    [J]. INTERNATIONAL JOURNAL OF FOUNDATIONS OF COMPUTER SCIENCE, 2017, 28 (06) : 645 - 660
  • [9] Dual trapdoor identity-based encryption with keyword search
    Liu, Jia'nan
    Lai, Junzuo
    Huang, Xinyi
    [J]. SOFT COMPUTING, 2017, 21 (10) : 2599 - 2607
  • [10] Dual trapdoor identity-based encryption with keyword search
    Jia’nan Liu
    Junzuo Lai
    Xinyi Huang
    [J]. Soft Computing, 2017, 21 : 2599 - 2607