Key-updatable public-key encryption with keyword search (Or: How to realize PEKS with efficient key updates for IoT environments)

被引:0
|
作者
Hiroaki Anada
Akira Kanaoka
Natsume Matsuzaki
Yohei Watanabe
机构
[1] University of Nagasaki,
[2] Toho-University,undefined
[3] The University of Electro-Communications,undefined
[4] Advanced Institute of National Institute of Advanced Industrial Science and Technology (AIST),undefined
[5] National Institute of Information and Communications Technology (NICT),undefined
关键词
Searchable encryption; Public-key encryption with keyword search; Key updates; IoT environments; Raspberry Pi;
D O I
暂无
中图分类号
学科分类号
摘要
Security and privacy are the key issues for the Internet of Things (IoT) systems. Especially, secure search is an important functionality for cooperation among users’ devices and non-trusted servers. Public-key encryption with keyword search (PEKS) enables us to search encrypted data and is expected to be used between a cloud server and users’ mobile devices or IoT devices. However, those mobile devices might be lost or stolen. For IoT devices, it might be difficult to store keys in a tamper-proof manner due to prohibitive costs. In this paper, we deal with such a key-exposure problem on PEKS and introduce the concept of PEKS with key-updating functionality, which we call key-updatable PEKS (KU-PEKS). Specifically, we propose two models of KU-PEKS: the key-evolution model and the key-insulation model. In the key-evolution model, a pair of public and secret keys can be updated if needed (e.g., the secret key is exposed). In the key-insulation model, the public key remains fixed while the secret key can be updated if needed. The former model makes a construction simple and more efficient than the latter. On the other hand, the latter model is preferable for practical use since a user never updates their public key. We show constructions in each model in a black-box manner. We also give implementation results on Raspberry Pi 3, which can be regarded as a reasonable platform of IoT devices.
引用
收藏
页码:15 / 38
页数:23
相关论文
共 50 条
  • [1] Key-updatable public-key encryption with keyword search (Or: How to realize PEKS with efficient key updates for IoT environments)
    Anada, Hiroaki
    Kanaoka, Akira
    Matsuzaki, Natsume
    Watanabe, Yohei
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2020, 19 (01) : 15 - 38
  • [2] Key-Updatable Public-Key Encryption with Keyword Search: Models and Generic Constructions
    Anada, Hiroaki
    Kanaoka, Akira
    Matsuzaki, Natsume
    Watanabe, Yohei
    INFORMATION SECURITY AND PRIVACY, 2018, 10946 : 341 - 359
  • [3] Privacy-Preserving Key-Updatable Public Key Encryption with Keyword Search Supporting Ciphertext Sharing Function
    Wang, Fen
    Lu, Yang
    Wang, Zhongqi
    Tian, Jinmei
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2022, 16 (01) : 266 - 286
  • [4] Towards Post-Quantum Key-Updatable Public-Key Encryption via Supersingular Isogenies
    Eaton, Edward
    Jao, David
    Komlo, Chelsea
    Mokrani, Youcef
    SELECTED AREAS IN CRYPTOGRAPHY, 2022, 13203 : 461 - 482
  • [5] Public-Key Encryption with Integrated Keyword Search
    Vishal Saraswat
    Rajeev Anand Sahu
    Gaurav Sharma
    Veronika Kuchta
    Olivier Markowitch
    Journal of Hardware and Systems Security, 2019, 3 (1) : 12 - 25
  • [6] Public-Key Encryption with Registered Keyword Search
    Tang, Qiang
    Chen, Liqun
    PUBLIC KEY INFRASTRUCTURES, SERVICES AND APPLICATIONS, 2010, 6391 : 163 - +
  • [7] Efficient Updatable Public-Key Encryption from Lattices
    Abou Haidar, Calvin
    Passelegue, Alain
    Stehle, Damien
    ADVANCES IN CRYPTOLOGY, ASIACRYPT 2023, PT V, 2023, 14442 : 342 - 373
  • [8] Public-Key Encryption with Efficient Amortized Updates
    Chandran, Nishanth
    Ostrovsky, Rafail
    Skeith, William E., III
    SECURITY AND CRYPTOGRAPHY FOR NETWORKS, 2010, 6280 : 17 - +
  • [9] A more efficient public-key authenticated encryption scheme with keyword search
    Huang, Qiong
    Huang, Peisen
    Li, Hongbo
    Huang, Jianye
    Lin, Hongyuan
    JOURNAL OF SYSTEMS ARCHITECTURE, 2023, 137
  • [10] Public-Key Encryption With Keyword Search via Obfuscation
    Hu, Chengyu
    Liu, Pengtao
    Yang, Rupeng
    Xu, Yan
    IEEE ACCESS, 2019, 7 : 37394 - 37405