• Complex
  • Title
  • Keyword
  • Abstract
  • Scholars
  • Journal
  • ISSN
  • Conference
成果搜索

author:

Qin, B. (Qin, B..) [1] | Chen, Y. (Chen, Y..) [2] | Huang, Q. (Huang, Q..) [3] | Liu, X. (Liu, X..) [4] | Zheng, D. (Zheng, D..) [5]

Indexed by:

Scopus

Abstract:

In cloud era, it is necessary to store sensitive data in an encrypted form. This arises the interesting and challenging problem of searching on encrypted data. However, previous Public-key Encryption with Keyword Search (PEKS) inherently cannot resist against inside keyword guessing attacks. To alleviate this issue, recently Huang and Li proposed the notion of Public-key Authenticated Encryption with Keyword Search (PAEKS), which requires the data sender not only encrypting a keyword using the receiver's public key, but also authenticating it using his secret key. This paper first revisits HL-PAEKS security model and finds that it did not capture a realistic threat, called (outside) chosen multi-ciphertext attacks. That is, an outside adversary can decide whether two encrypted files share some identical keywords or not. To resolve this issue, we propose a new PAEKS security model that captures both (outside) chosen multi-ciphertext attacks and (inside) keyword guessing attacks. Then, we give a concrete PAEKS scheme and prove its security in the new PAEKS security model. We also propose a method to simplify data sender's key management using identity-based key exchange protocol. Finally, we provide implementation results of our schemes to show the comparable efficiency of our schemes with previous PEKS/PAEKS schemes. © 2019

Keyword:

Authentication; Keyword guessing attacks; Multi-ciphertext attacks; Public-key cryptosystem; Searchable encryption

Community:

  • [ 1 ] [Qin, B.]School of Cyberspace Security, Xi'an University of Posts & Telecommunications, Xi'an, 710121, China
  • [ 2 ] [Qin, B.]State Key Laboratory of Integrated Services Networks, Xidian University, Xi'an, China
  • [ 3 ] [Qin, B.]National Engineering Laboratory for Wireless Security, Xi'an University of Posts Telecommunications, Xi'an, 710121, China
  • [ 4 ] [Chen, Y.]State Key Laboratory of Information Security (SKLOIS), Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China
  • [ 5 ] [Huang, Q.]College of Mathematics and Informatics, South China Agricultural University, Guangzhou, 510642, China
  • [ 6 ] [Liu, X.]College of Mathematics and Computer Science, Fuzhou University, Fuzhou, 350116, China
  • [ 7 ] [Zheng, D.]School of Cyberspace Security, Xi'an University of Posts & Telecommunications, Xi'an, 710121, China
  • [ 8 ] [Zheng, D.]National Engineering Laboratory for Wireless Security, Xi'an University of Posts Telecommunications, Xi'an, 710121, China

Reprint 's Address:

  • [Qin, B.]School of Cyberspace Security, Xi'an University of Posts & TelecommunicationsChina

Show more details

Related Keywords:

Related Article:

Source :

Information Sciences

ISSN: 0020-0255

Year: 2020

Volume: 516

Page: 515-528

6 . 7 9 5

JCR@2020

0 . 0 0 0

JCR@2023

ESI HC Threshold:149

JCR Journal Grade:1

CAS Journal Grade:1

Cited Count:

WoS CC Cited Count:

SCOPUS Cited Count: 97

ESI Highly Cited Papers on the List: 0 Unfold All

WanFang Cited Count:

Chinese Cited Count:

30 Days PV: 3

Affiliated Colleges:

Online/Total:119/10052014
Address:FZU Library(No.2 Xuyuan Road, Fuzhou, Fujian, PRC Post Code:350116) Contact Us:0591-22865326
Copyright:FZU Library Technical Support:Beijing Aegean Software Co., Ltd. 闽ICP备05005463号-1