Key-updatable public-key encryption with keyword search (Or: How to realize PEKS with efficient key updates for IoT environments)

被引:0
|
作者
Hiroaki Anada
Akira Kanaoka
Natsume Matsuzaki
Yohei Watanabe
机构
[1] University of Nagasaki,
[2] Toho-University,undefined
[3] The University of Electro-Communications,undefined
[4] Advanced Institute of National Institute of Advanced Industrial Science and Technology (AIST),undefined
[5] National Institute of Information and Communications Technology (NICT),undefined
关键词
Searchable encryption; Public-key encryption with keyword search; Key updates; IoT environments; Raspberry Pi;
D O I
暂无
中图分类号
学科分类号
摘要
Security and privacy are the key issues for the Internet of Things (IoT) systems. Especially, secure search is an important functionality for cooperation among users’ devices and non-trusted servers. Public-key encryption with keyword search (PEKS) enables us to search encrypted data and is expected to be used between a cloud server and users’ mobile devices or IoT devices. However, those mobile devices might be lost or stolen. For IoT devices, it might be difficult to store keys in a tamper-proof manner due to prohibitive costs. In this paper, we deal with such a key-exposure problem on PEKS and introduce the concept of PEKS with key-updating functionality, which we call key-updatable PEKS (KU-PEKS). Specifically, we propose two models of KU-PEKS: the key-evolution model and the key-insulation model. In the key-evolution model, a pair of public and secret keys can be updated if needed (e.g., the secret key is exposed). In the key-insulation model, the public key remains fixed while the secret key can be updated if needed. The former model makes a construction simple and more efficient than the latter. On the other hand, the latter model is preferable for practical use since a user never updates their public key. We show constructions in each model in a black-box manner. We also give implementation results on Raspberry Pi 3, which can be regarded as a reasonable platform of IoT devices.
引用
收藏
页码:15 / 38
页数:23
相关论文
共 50 条
  • [31] Generic construction of designated tester public-key encryption with keyword search
    Rhee, Hyun Sook
    Park, Jong Hwan
    Lee, Dong Noon
    INFORMATION SCIENCES, 2012, 205 : 93 - 109
  • [32] Public-Key Encryption with Delegated Search
    Ibraimi, Luan
    Nikova, Svetla
    Hartel, Pieter
    Jonker, Willem
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY (ACNS 2011), 2011, 6715 : 532 - 549
  • [33] Exposure Resilient Public-key Encryption with Keyword Search against Keyword Guessing Attack
    Uemura, Kaito
    Obana, Satoshi
    SECRYPT 2021: PROCEEDINGS OF THE 18TH INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2021, : 692 - 697
  • [34] On the Implications from Updatable Encryption to Public-Key Cryptographic Primitives
    Tanishita, Yuichi
    Hayashi, Ryuya
    Ishii, Ryu
    Matsuda, Takahiro
    Matsuura, Kanta
    INFORMATION SECURITY AND PRIVACY, PT I, ACISP 2024, 2024, 14895 : 303 - 323
  • [35] Public-Key Inverted-Index Keyword Search With Designated Tester and Multiuser Key Decryption in IoT
    Gao, Nan
    Fan, Kai
    Wang, Haoyang
    Zhang, Kuan
    Li, Hui
    Yang, Yintang
    IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (01) : 1065 - 1079
  • [36] Public key encryption with keyword search revisited
    Baek, Joonsang
    Safavi-Naini, Reihaneh
    Susilo, Willy
    COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2008, PT 1, PROCEEDINGS, 2008, 5072 : 1249 - 1259
  • [37] Public Key Encryption with Wildcards Keyword Search
    Wang, Zhao-li
    Han, Jin-li
    Wang, Mei-juan
    Shi, Ya-qing
    Dong, Hui
    2018 EIGHTH INTERNATIONAL CONFERENCE ON INSTRUMENTATION AND MEASUREMENT, COMPUTER, COMMUNICATION AND CONTROL (IMCCC 2018), 2018, : 538 - 541
  • [38] Public key encryption with distributed keyword search
    Eslami, Ziba
    Noroozi, Mahnaz
    Amirizirtol, Kobra
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2022, 25 (08): : 2369 - 2393
  • [39] Certificateless Public Key Encryption with Keyword Search
    Peng Yanguo
    Cui Jiangtao
    Peng Changgen
    Ying Zuobin
    CHINA COMMUNICATIONS, 2014, 11 (11) : 100 - 113
  • [40] VR-PEKS: A Verifiable and Resistant to Keyword Guess Attack Public Key Encryption with Keyword Search Scheme
    Tang, Yingying
    Chen, Yuling
    Luo, Yun
    Dong, Sen
    Li, Tao
    APPLIED SCIENCES-BASEL, 2023, 13 (07):