State-free End-to-End Encrypted Storage and Chat Systems based on Searchable Encryption

被引:0
|
作者
Emura, Keita [1 ]
Ito, Ryoma [1 ]
Kanamori, Sachiko [1 ]
Nojima, Ryo [1 ]
Watanabe, Yohei [1 ,2 ]
机构
[1] Natl Inst Informat & Commun Technol, Tokyo, Japan
[2] Univ Electrocommun, Chofu, Tokyo, Japan
关键词
Dynamic Searchable Symmetric Encryption; State-free; Secure Storage and Chat Systems;
D O I
10.5220/0011045200003179
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Searchable symmetric encryption (SSE) has attracted significant attention because it can prevent data leakage from external devices, e.g., on clouds. SSE appears to be effective to construct such a secure system; however, it is not trivial to construct such a system from SSE in practice because other parts must be designed, e.g., user login management, defining the keyword space, and sharing secret keys among multiple users who usually do not have public key certificates. In this paper, we describe the implementation of two systems based upon the state-free dynamic SSE (DSSE) (Watanabe et al., ePrint 2021), i.e., a secure storage system (for a single user) and a chat system (for multiple users). In addition to the Watanabe et al. DSSE protocol, we employ a secure multipath key exchange (SMKEX) protocol (Costea et al., CCS 2018), which is secure against some classes of unsynchronized active attackers. It allows the chat system users without certificates to share a secret key of the DSSE protocol in a secure manner. To realize end-to-end encryption, the shared key must be kept secret; thus, we must consider how to preserve the secret on, for example, a user's local device. However, this requires additional security assumptions, e.g., tamper resistance, and it seems difficult to assume that all users have such devices. Thus, we propose a secure key agreement protocol by combining the SMKEX and login information (password) that does not require an additional tamper-resistant device. Combining the proposed key agreement protocol and the underlying state-free DSSE protocol allow users who know the password to use the systems on multiple devices.
引用
收藏
页码:106 / 113
页数:8
相关论文
共 50 条
  • [41] Secure Data Aggregation Based on End-to-End Homomorphic Encryption in IoT-Based Wireless Sensor Networks
    Kumar, Mukesh
    Sethi, Monika
    Rani, Shalli
    Sah, Dipak Kumar
    AlQahtani, Salman A.
    Al-Rakhami, Mabrook S.
    SENSORS, 2023, 23 (13)
  • [42] An approach to fast inferring link state probability based on end-to-end measurement
    Zhao Z.
    Cai W.-D.
    Huanan Ligong Daxue Xuebao/Journal of South China University of Technology (Natural Science), 2010, 38 (11): : 110 - 116
  • [43] End-to-end security validation of IoT systems based on digital twins of end-devices
    Maillet-Contoz, Laurent
    Michel, Emmanuel
    Nava, Mario Diaz
    Brun, Paul-Emmanuel
    Lepretre, Kevin
    Massot, Guillemette
    2020 GLOBAL INTERNET OF THINGS SUMMIT (GIOTS), 2020,
  • [44] FEDResNet: a flexible image encryption and decryption scheme based on end-to-end image diffusion with dilated ResNet
    Zhu, Leqing
    Qu, Weiwei
    Wen, Xingyang
    Zhu, Chunxiang
    APPLIED OPTICS, 2022, 61 (31) : 9124 - 9134
  • [45] End-To-End Efficiency of Liquid Piston based Ocean Compressed Air Energy Storage
    Patil, Vikram C.
    Ro, Paul I.
    Ranganath, Kishore R.
    OCEANS 2016 MTS/IEEE MONTEREY, 2016,
  • [46] Live Demonstration: End-to-End Real-Time ROI-based Encryption in HEVC Videos
    Sidaty, Naty
    Viitanen, Marko
    Hamidouche, Wassim
    Vanne, Jarno
    Deforges, Olivier
    2018 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS (ISCAS), 2018,
  • [47] End-to-end optimization of optical communication systems based on directly modulated lasers
    Hernandez, Sergio
    Peucheret, Christophe
    Da Ros, Francesco
    Zibar, Darko
    JOURNAL OF OPTICAL COMMUNICATIONS AND NETWORKING, 2024, 16 (08) : D29 - D43
  • [48] Channel Agnostic End-to-End Learning based Communication Systems with Conditional GAN
    Ye, Hao
    Li, Geoffrey Ye
    Juang, Biing-Hwang Fred
    Sivanesan, Kathiravetpillai
    2018 IEEE GLOBECOM WORKSHOPS (GC WKSHPS), 2018,
  • [49] BitFool: An Optimization-based Adversarial Attack for End-to-End Communication Systems
    Yang, Runzhuo
    Cheng, Jiaying
    Liu, Donghang
    Li, Dou
    2024 9TH INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATION SYSTEMS, ICCCS 2024, 2024, : 1014 - 1020
  • [50] Deep Learning Based End-to-End Optical Wireless Communication Systems With Autoencoders
    Safi, Hossein
    Tavakkolnia, Iman
    Haas, Harald
    IEEE COMMUNICATIONS LETTERS, 2024, 28 (06) : 1342 - 1346