Dual-Server Public-Key Encryption With Keyword Search for Secure Cloud Storage

被引:191
|
作者
Chen, Rongmao [1 ,2 ]
Mu, Yi [1 ]
Yang, Guomin [1 ]
Guo, Fuchun [1 ]
Wang, Xiaofen [1 ,3 ]
机构
[1] Univ Wollongong, Sch Comp & Informat Technol, Ctr Comp & Informat Secur Res, Wollongong, NSW 2522, Australia
[2] Natl Univ Def Technol, Coll Comp, Changsha 410073, Hunan, Peoples R China
[3] Univ Elect Sci & Technol China, Sch Comp Sci & Engn, Big Data Res Ctr, Chengdu 611731, Peoples R China
基金
中国国家自然科学基金;
关键词
Keyword search; secure cloud storage; encryption; inside keyword guessing attack; smooth projective hash function; Diffie-Hellman language; GUESSING ATTACKS; SCHEME;
D O I
10.1109/TIFS.2015.2510822
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Searchable encryption is of increasing interest for protecting the data privacy in secure searchable cloud storage. In this paper, we investigate the security of a well-known cryptographic primitive, namely, public key encryption with keyword search (PEKS) which is very useful in many applications of cloud storage. Unfortunately, it has been shown that the traditional PEKS framework suffers from an inherent insecurity called inside keyword guessing attack (KGA) launched by the malicious server. To address this security vulnerability, we propose a new PEKS framework named dual-server PEKS (DS-PEKS). As another main contribution, we define a new variant of the smooth projective hash functions (SPHFs) referred to as linear and homomorphic SPHF (LH-SPHF). We then show a generic construction of secure DS-PEKS from LH-SPHF. To illustrate the feasibility of our new framework, we provide an efficient instantiation of the general framework from a Decision Diffie-Hellman-based LH-SPHF and show that it can achieve the strong security against inside the KGA.
引用
收藏
页码:789 / 798
页数:10
相关论文
共 50 条
  • [21] Verifiable Public-Key Encryption with Keyword Search Secure against Continual Memory Attacks
    Hu, Chengyu
    Li, Zhen
    Liu, Pengtao
    Yang, Rupeng
    Guo, Shanqing
    Zhang, Hailong
    MOBILE NETWORKS & APPLICATIONS, 2021, 26 (06): : 2490 - 2500
  • [22] Efficient Secure-Channel Free Public Key Encryption with Keyword Search for EMRs in Cloud Storage
    Guo, Lifeng
    Yau, Wei-Chuen
    JOURNAL OF MEDICAL SYSTEMS, 2015, 39 (02)
  • [23] Efficient Secure-Channel Free Public Key Encryption with Keyword Search for EMRs in Cloud Storage
    Lifeng Guo
    Wei-Chuen Yau
    Journal of Medical Systems, 2015, 39
  • [24] TCA-PEKS: Trusted certificateless authentication public-key encryption with keyword search scheme in cloud storage
    Mu Han
    Puyi Xu
    Lei Xu
    Chungen Xu
    Peer-to-Peer Networking and Applications, 2023, 16 : 156 - 169
  • [25] TCA-PEKS: Trusted certificateless authentication public-key encryption with keyword search scheme in cloud storage
    Han, Mu
    Xu, Puyi
    Xu, Lei
    Xu, Chungen
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2023, 16 (01) : 156 - 169
  • [26] Single-Server Public-Key Authenticated Encryption With Keyword Search and Its Application in IIoT
    Zhou, Xiaotong
    He, Debiao
    Ning, Jianting
    Luo, Min
    Huang, Xinyi
    IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, 2024, 11 (01): : 404 - 415
  • [27] A lattice-based designated-server public-key authenticated encryption with keyword search
    Fan, Yajun
    Qin, Baodong
    Zheng, Dong
    JOURNAL OF SYSTEMS ARCHITECTURE, 2023, 145
  • [28] Scalable CCA-secure public-key authenticated encryption with keyword search from ideal lattices in cloud computing
    Yao, Lisha
    Weng, Jian
    Yang, Anjia
    Liang, Xiaojian
    Wu, Zhenghao
    Jiang, Zike
    Hou, Lin
    INFORMATION SCIENCES, 2023, 624 : 777 - 795
  • [29] Public-key encryption with keyword search: a generic construction secure against online and offline keyword guessing attacks
    Mahnaz Noroozi
    Ziba Eslami
    Journal of Ambient Intelligence and Humanized Computing, 2020, 11 : 879 - 890
  • [30] Public-key encryption with keyword search: a generic construction secure against online and offline keyword guessing attacks
    Noroozi, Mahnaz
    Eslami, Ziba
    JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2020, 11 (02) : 879 - 890