• Complex
  • Title
  • Keyword
  • Abstract
  • Scholars
  • Journal
  • ISSN
  • Conference
成果搜索

author:

Qin, Baodong (Qin, Baodong.) [1] | Chen, Yu (Chen, Yu.) [2] | Huang, Qiong (Huang, Qiong.) [3] | Liu, Ximeng (Liu, Ximeng.) [4] | Zheng, Dong (Zheng, Dong.) [5]

Indexed by:

EI

Abstract:

In cloud era, it is necessary to store sensitive data in an encrypted form. This arises the interesting and challenging problem of searching on encrypted data. However, previous Public-key Encryption with Keyword Search (PEKS) inherently cannot resist against inside keyword guessing attacks. To alleviate this issue, recently Huang and Li proposed the notion of Public-key Authenticated Encryption with Keyword Search (PAEKS), which requires the data sender not only encrypting a keyword using the receiver's public key, but also authenticating it using his secret key. This paper first revisits HL-PAEKS security model and finds that it did not capture a realistic threat, called (outside) chosen multi-ciphertext attacks. That is, an outside adversary can decide whether two encrypted files share some identical keywords or not. To resolve this issue, we propose a new PAEKS security model that captures both (outside) chosen multi-ciphertext attacks and (inside) keyword guessing attacks. Then, we give a concrete PAEKS scheme and prove its security in the new PAEKS security model. We also propose a method to simplify data sender's key management using identity-based key exchange protocol. Finally, we provide implementation results of our schemes to show the comparable efficiency of our schemes with previous PEKS/PAEKS schemes. © 2019

Keyword:

Authentication Public key cryptography Search engines

Community:

  • [ 1 ] [Qin, Baodong]School of Cyberspace Security, Xi'an University of Posts & Telecommunications, Xi'an; 710121, China
  • [ 2 ] [Qin, Baodong]State Key Laboratory of Integrated Services Networks, Xidian University, Xi'an, China
  • [ 3 ] [Qin, Baodong]National Engineering Laboratory for Wireless Security, Xi'an University of Posts Telecommunications, Xi'an; 710121, China
  • [ 4 ] [Chen, Yu]State Key Laboratory of Information Security (SKLOIS), Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China
  • [ 5 ] [Huang, Qiong]College of Mathematics and Informatics, South China Agricultural University, Guangzhou; 510642, China
  • [ 6 ] [Liu, Ximeng]College of Mathematics and Computer Science, Fuzhou University, Fuzhou; 350116, China
  • [ 7 ] [Zheng, Dong]School of Cyberspace Security, Xi'an University of Posts & Telecommunications, Xi'an; 710121, China
  • [ 8 ] [Zheng, Dong]National Engineering Laboratory for Wireless Security, Xi'an University of Posts Telecommunications, Xi'an; 710121, China

Reprint 's Address:

  • [qin, baodong]school of cyberspace security, xi'an university of posts & telecommunications, xi'an; 710121, china;;[qin, baodong]national engineering laboratory for wireless security, xi'an university of posts telecommunications, xi'an; 710121, china;;[qin, baodong]state key laboratory of integrated services networks, xidian university, xi'an, china

Show more details

Related Keywords:

Source :

Information Sciences

ISSN: 0020-0255

Year: 2020

Volume: 516

Page: 515-528

6 . 7 9 5

JCR@2020

0 . 0 0 0

JCR@2023

ESI HC Threshold:149

JCR Journal Grade:1

CAS Journal Grade:1

Cited Count:

WoS CC Cited Count: 0

SCOPUS Cited Count: 97

ESI Highly Cited Papers on the List: 0 Unfold All

WanFang Cited Count:

Chinese Cited Count:

30 Days PV: 1

Affiliated Colleges:

Online/Total:158/10051827
Address:FZU Library(No.2 Xuyuan Road, Fuzhou, Fujian, PRC Post Code:350116) Contact Us:0591-22865326
Copyright:FZU Library Technical Support:Beijing Aegean Software Co., Ltd. 闽ICP备05005463号-1