Dual-Server Public-Key Encryption With Keyword Search for Secure Cloud Storage

被引:191
|
作者
Chen, Rongmao [1 ,2 ]
Mu, Yi [1 ]
Yang, Guomin [1 ]
Guo, Fuchun [1 ]
Wang, Xiaofen [1 ,3 ]
机构
[1] Univ Wollongong, Sch Comp & Informat Technol, Ctr Comp & Informat Secur Res, Wollongong, NSW 2522, Australia
[2] Natl Univ Def Technol, Coll Comp, Changsha 410073, Hunan, Peoples R China
[3] Univ Elect Sci & Technol China, Sch Comp Sci & Engn, Big Data Res Ctr, Chengdu 611731, Peoples R China
基金
中国国家自然科学基金;
关键词
Keyword search; secure cloud storage; encryption; inside keyword guessing attack; smooth projective hash function; Diffie-Hellman language; GUESSING ATTACKS; SCHEME;
D O I
10.1109/TIFS.2015.2510822
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Searchable encryption is of increasing interest for protecting the data privacy in secure searchable cloud storage. In this paper, we investigate the security of a well-known cryptographic primitive, namely, public key encryption with keyword search (PEKS) which is very useful in many applications of cloud storage. Unfortunately, it has been shown that the traditional PEKS framework suffers from an inherent insecurity called inside keyword guessing attack (KGA) launched by the malicious server. To address this security vulnerability, we propose a new PEKS framework named dual-server PEKS (DS-PEKS). As another main contribution, we define a new variant of the smooth projective hash functions (SPHFs) referred to as linear and homomorphic SPHF (LH-SPHF). We then show a generic construction of secure DS-PEKS from LH-SPHF. To illustrate the feasibility of our new framework, we provide an efficient instantiation of the general framework from a Decision Diffie-Hellman-based LH-SPHF and show that it can achieve the strong security against inside the KGA.
引用
收藏
页码:789 / 798
页数:10
相关论文
共 50 条
  • [1] Dual-Server Public-Key Authenticated Encryption with Keyword Search
    Chen, Biwen
    Wu, Libing
    Zeadally, Sherali
    He, Debiao
    IEEE TRANSACTIONS ON CLOUD COMPUTING, 2022, 10 (01) : 322 - 333
  • [2] Provable Secure Dual-Server Public Key Encryption with Keyword Search
    Huang, Kaibin
    Tso, Raylin
    2017 IEEE 2ND INTERNATIONAL VERIFICATION AND SECURITY WORKSHOP (IVSW), 2017, : 39 - 44
  • [3] Generic Construction of Dual-Server Public Key Encryption With Keyword Search on Cloud Computing
    Tso, Raylin
    Huang, Kaibin
    Chen, Yu-Chi
    Rahman, Sk Md Mizanur
    Wu, Tsu-Yang
    IEEE ACCESS, 2020, 8 : 152551 - 152564
  • [4] Forward Secure Public Key Encryption with Keyword Search for Outsourced Cloud Storage
    Zeng, Ming
    Qian, Haifeng
    Chen, Jie
    Zhang, Kai
    IEEE TRANSACTIONS ON CLOUD COMPUTING, 2022, 10 (01) : 426 - 438
  • [5] iPEKS: Fast and Secure Cloud Data Retrieval from the Public-key Encryption with Keyword Search
    Tseng, Fu-Kuo
    Chen, Rong-Jaye
    Lin, Bao-Shuh Paul
    2013 12TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2013), 2013, : 452 - 458
  • [6] Provably secure public-key encryption with conjunctive and subset keyword search
    Farras, Oriol
    Ribes-Gonzalez, Jordi
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2019, 18 (05) : 533 - 548
  • [7] Forward Secure Public-key Authenticated Encryption with Conjunctive Keyword Search
    JIANG, Z. H. E.
    ZHANG, K. A., I
    WANG, L. I. A. N. G. L. I. A. N. G.
    NING, J. I. A. N. T. I. N. G.
    COMPUTER JOURNAL, 2023, 66 (09): : 2265 - 2278
  • [8] Provably secure public-key encryption with conjunctive and subset keyword search
    Oriol Farràs
    Jordi Ribes-González
    International Journal of Information Security, 2019, 18 : 533 - 548
  • [9] Blockchain-Assisted Public-Key Encryption with Keyword Search Against Keyword Guessing Attacks for Cloud Storage
    Zhang, Yuan
    Xu, Chunxiang
    Ni, Jianbing
    Li, Hongwei
    Shen, Xuemin
    IEEE TRANSACTIONS ON CLOUD COMPUTING, 2021, 9 (04) : 1335 - 1348
  • [10] Public-Key Encryption with Integrated Keyword Search
    Vishal Saraswat
    Rajeev Anand Sahu
    Gaurav Sharma
    Veronika Kuchta
    Olivier Markowitch
    Journal of Hardware and Systems Security, 2019, 3 (1) : 12 - 25