Dual-Server Public-Key Encryption With Keyword Search for Secure Cloud Storage

被引:191
|
作者
Chen, Rongmao [1 ,2 ]
Mu, Yi [1 ]
Yang, Guomin [1 ]
Guo, Fuchun [1 ]
Wang, Xiaofen [1 ,3 ]
机构
[1] Univ Wollongong, Sch Comp & Informat Technol, Ctr Comp & Informat Secur Res, Wollongong, NSW 2522, Australia
[2] Natl Univ Def Technol, Coll Comp, Changsha 410073, Hunan, Peoples R China
[3] Univ Elect Sci & Technol China, Sch Comp Sci & Engn, Big Data Res Ctr, Chengdu 611731, Peoples R China
基金
中国国家自然科学基金;
关键词
Keyword search; secure cloud storage; encryption; inside keyword guessing attack; smooth projective hash function; Diffie-Hellman language; GUESSING ATTACKS; SCHEME;
D O I
10.1109/TIFS.2015.2510822
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Searchable encryption is of increasing interest for protecting the data privacy in secure searchable cloud storage. In this paper, we investigate the security of a well-known cryptographic primitive, namely, public key encryption with keyword search (PEKS) which is very useful in many applications of cloud storage. Unfortunately, it has been shown that the traditional PEKS framework suffers from an inherent insecurity called inside keyword guessing attack (KGA) launched by the malicious server. To address this security vulnerability, we propose a new PEKS framework named dual-server PEKS (DS-PEKS). As another main contribution, we define a new variant of the smooth projective hash functions (SPHFs) referred to as linear and homomorphic SPHF (LH-SPHF). We then show a generic construction of secure DS-PEKS from LH-SPHF. To illustrate the feasibility of our new framework, we provide an efficient instantiation of the general framework from a Decision Diffie-Hellman-based LH-SPHF and show that it can achieve the strong security against inside the KGA.
引用
收藏
页码:789 / 798
页数:10
相关论文
共 50 条
  • [11] Public-Key Encryption with Registered Keyword Search
    Tang, Qiang
    Chen, Liqun
    PUBLIC KEY INFRASTRUCTURES, SERVICES AND APPLICATIONS, 2010, 6391 : 163 - +
  • [12] An error-tolerant keyword search scheme based on public-key encryption in secure cloud computing
    Bo, Yang
    Zhang, Mingwu
    Du, Jun-Qiang
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2016, 28 (04): : 1083 - 1093
  • [13] Public-key encryption with keyword search secure against continual memory attacks
    Hu, Chengyu
    Yang, Rupeng
    Liu, Pengtao
    Yu, Zuoxia
    Zhou, Yongbin
    Xu, Qiuliang
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (11) : 1613 - 1629
  • [14] Chosen-Ciphertext Attack Secure Public-Key Encryption with Keyword Search
    Rhee, Hyun Sook
    CMC-COMPUTERS MATERIALS & CONTINUA, 2022, 73 (01): : 69 - 85
  • [15] Improved Secure Server-Designated Public Key Encryption with Keyword Search
    Andola, Nitish
    Prakash, Sourabh
    Venkatesan, S.
    Verma, Shekhar
    2017 CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGY (CICT), 2017,
  • [16] On the Security of Secure Server-Designation Public Key Encryption with Keyword Search
    Lin, Xi-Jun
    Sun, Lin
    Qu, Haipeng
    Liu, Dongxiao
    COMPUTER JOURNAL, 2018, 61 (12): : 1791 - 1793
  • [17] Public-Key Encryption With Keyword Search via Obfuscation
    Hu, Chengyu
    Liu, Pengtao
    Yang, Rupeng
    Xu, Yan
    IEEE ACCESS, 2019, 7 : 37394 - 37405
  • [18] Public-Key Encryption with Keyword Search from Lattice
    Hou, Changjiang
    Liu, Fei
    Bai, Hongtao
    Ren, Lanfang
    2013 EIGHTH INTERNATIONAL CONFERENCE ON P2P, PARALLEL, GRID, CLOUD AND INTERNET COMPUTING (3PGCIC 2013), 2013, : 336 - 339
  • [19] Public-Key Encryption with Fuzzy Keyword Search: A Provably Secure Scheme under Keyword Guessing Attack
    Xu, Peng
    Jin, Hai
    Wu, Qianhong
    Wang, Wei
    IEEE TRANSACTIONS ON COMPUTERS, 2013, 62 (11) : 2266 - 2277
  • [20] Verifiable Public-Key Encryption with Keyword Search Secure against Continual Memory Attacks
    Chengyu Hu
    Zhen Li
    Pengtao Liu
    Rupeng Yang
    Shanqing Guo
    Hailong Zhang
    Mobile Networks and Applications, 2021, 26 : 2490 - 2500