Identity-based Public Key Keyword Searchable Encryption Scheme with Denial Authentication

被引:0
|
作者
Cao Suzhen [1 ]
Ding Binbin [1 ]
Ding Xiaohui [1 ]
Dou Fengge [1 ]
Wang Caifen [2 ]
机构
[1] Northwest Normal Univ, Lanzhou 730000, Peoples R China
[2] Shenzhen Technol Univ, Shenzhen 518118, Peoples R China
基金
中国国家自然科学基金;
关键词
Privacy of identity; Denial of authentication; Searchable encryption; GUESSING ATTACKS;
D O I
10.11999/JEIT210155
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The development of cloud storage technology achieves resource sharing, which reduces users data management overhead. Searchable encryption technology protects users privacy and supports ciphertext retrieval, making it easy for users to find encrypted data in the cloud. Although existing public key searchable encryption schemes support authentication, the denial property is not implemented. To protect better the senders identity privacy, an Identity-based Public Key keyword Searchable Encryption scheme with Denial Authentication (IDAPKSE) is proposed. In the proposed scheme, the sender uploads the ciphertext and has the ability to deny that he or she uploaded the ciphertext to the cloud server. At the same time, the receiver can confirm the origin of the ciphertext, however, even with the cooperation of a third party, the receiver can not prove the facts in his/her possession to the third party. Under the random oracle model, based on the Bilinear Diffie-Hellman(BDH) and Decisional Bilinear Diffie-Hellman(DBDH) assumptions, the proposed scheme satisfies unforgeability of the ciphertexts, and indistinguishability of ciphertexts and trapdoors.
引用
收藏
页码:1086 / 1092
页数:7
相关论文
共 18 条
  • [1] Baek J, 2008, LECT NOTES COMPUT SC, V5072, P1249, DOI 10.1007/978-3-540-69839-5_96
  • [2] [白利芳 Bai Lifang], 2020, [计算机科学, Computer Science], V47, P290
  • [3] Boneh D, 2004, LECT NOTES COMPUT SC, V3027, P506
  • [4] Byun JW, 2006, LECT NOTES COMPUT SC, V4165, P75
  • [5] Concurrent zero-knowledge
    Dwork, C
    Naor, M
    Sahai, A
    [J]. JOURNAL OF THE ACM, 2004, 51 (06) : 851 - 898
  • [6] [韩培义 Han Peiyi], 2020, [通信学报, Journal on Communications], V41
  • [7] An efficient public-key searchable encryption scheme secure against inside keyword guessing attacks
    Huang, Qiong
    Li, Hongbo
    [J]. INFORMATION SCIENCES, 2017, 403 : 1 - 14
  • [8] Identity-based deniable authenticated encryption and its application to e-mail system
    Li, Fagen
    Zheng, Zhaohui
    Jin, Chunhua
    [J]. TELECOMMUNICATION SYSTEMS, 2016, 62 (04) : 625 - 639
  • [9] Designated-server identity-based authenticated encryption with keyword search for encrypted emails
    Li, Hongbo
    Huang, Qiong
    Shen, Jian
    Yang, Guomin
    Susilo, Willy
    [J]. INFORMATION SCIENCES, 2019, 481 : 330 - 343
  • [10] An ID-Based Linearly Homomorphic Signature Scheme and Its Application in Blockchain
    Lin, Qun
    Yan, Hongyang
    Huang, Zhengan
    Chen, Wenbin
    Shen, Jian
    Tang, Yi
    [J]. IEEE ACCESS, 2018, 6 : 20632 - 20640