Key-updatable public-key encryption with keyword search (Or: How to realize PEKS with efficient key updates for IoT environments)

被引:0
|
作者
Hiroaki Anada
Akira Kanaoka
Natsume Matsuzaki
Yohei Watanabe
机构
[1] University of Nagasaki,
[2] Toho-University,undefined
[3] The University of Electro-Communications,undefined
[4] Advanced Institute of National Institute of Advanced Industrial Science and Technology (AIST),undefined
[5] National Institute of Information and Communications Technology (NICT),undefined
关键词
Searchable encryption; Public-key encryption with keyword search; Key updates; IoT environments; Raspberry Pi;
D O I
暂无
中图分类号
学科分类号
摘要
Security and privacy are the key issues for the Internet of Things (IoT) systems. Especially, secure search is an important functionality for cooperation among users’ devices and non-trusted servers. Public-key encryption with keyword search (PEKS) enables us to search encrypted data and is expected to be used between a cloud server and users’ mobile devices or IoT devices. However, those mobile devices might be lost or stolen. For IoT devices, it might be difficult to store keys in a tamper-proof manner due to prohibitive costs. In this paper, we deal with such a key-exposure problem on PEKS and introduce the concept of PEKS with key-updating functionality, which we call key-updatable PEKS (KU-PEKS). Specifically, we propose two models of KU-PEKS: the key-evolution model and the key-insulation model. In the key-evolution model, a pair of public and secret keys can be updated if needed (e.g., the secret key is exposed). In the key-insulation model, the public key remains fixed while the secret key can be updated if needed. The former model makes a construction simple and more efficient than the latter. On the other hand, the latter model is preferable for practical use since a user never updates their public key. We show constructions in each model in a black-box manner. We also give implementation results on Raspberry Pi 3, which can be regarded as a reasonable platform of IoT devices.
引用
收藏
页码:15 / 38
页数:23
相关论文
共 50 条
  • [41] Towards Enhanced Security for Certificateless Public-Key Authenticated Encryption with Keyword Search
    Liu, Xueqiao
    Li, Hongbo
    Yang, Guomin
    Susilo, Willy
    Tonien, Joseph
    Huang, Qiong
    PROVABLE SECURITY, PROVSEC 2019, 2019, 11821 : 113 - 129
  • [42] Public Key Encryption with Keyword Search from Lattices in Multiuser Environments
    Wu, Daini
    Wang, Xiaoming
    Gan, Qingqing
    MATHEMATICAL PROBLEMS IN ENGINEERING, 2016, 2016
  • [43] Public-key encryption with keyword search secure against continual memory attacks
    Hu, Chengyu
    Yang, Rupeng
    Liu, Pengtao
    Yu, Zuoxia
    Zhou, Yongbin
    Xu, Qiuliang
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (11) : 1613 - 1629
  • [44] Lightweight Multi-User Public-Key Authenticated Encryption With Keyword Search
    Xu, Yongliang
    Cheng, Hang
    Li, Jiguo
    Liu, Ximeng
    Zhang, Xinpeng
    Wang, Meiqing
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2025, 20 : 3234 - 3246
  • [45] Public-key authenticated encryption with keyword search revisited: Security model and constructions
    Qin, Baodong
    Chen, Yu
    Huang, Qiong
    Liu, Ximeng
    Zheng, Dong
    INFORMATION SCIENCES, 2020, 516 : 515 - 528
  • [46] Public-key encryption with bidirectional keyword search and its application to encrypted emails
    Zhang, Wenzheng
    Qin, Baodong
    Dong, Xinfeng
    Tian, Aikui
    COMPUTER STANDARDS & INTERFACES, 2021, 78
  • [47] Chosen-Ciphertext Attack Secure Public-Key Encryption with Keyword Search
    Rhee, Hyun Sook
    CMC-COMPUTERS MATERIALS & CONTINUA, 2022, 73 (01): : 69 - 85
  • [48] The Public Verifiability of Public Key Encryption with Keyword Search
    Zhu, Binrui
    Sun, Jiameng
    Qin, Jing
    Ma, Jixin
    MOBILE NETWORKS AND MANAGEMENT (MONAMI 2017), 2018, 235 : 299 - 312
  • [49] PUBLIC-KEY ENCRYPTION
    STUBBS, E
    EDN MAGAZINE-ELECTRICAL DESIGN NEWS, 1984, 29 (04): : 29 - 29
  • [50] Efficient public key encryption with revocable keyword search in cloud computing
    Jianhong Zhang
    Jian Mao
    Cluster Computing, 2016, 19 : 1211 - 1217