Certificateless Public Key Authenticated Encryption with Keyword Search Achieving Stronger Security
نویسندگان
چکیده
Transforming data into ciphertexts and storing them in the cloud database is a secure way to simplify management. Public key encryption with keyword search (PEKS) an important cryptographic primitive as it provides ability for desired files among ciphertexts. As variant of PEKS, certificateless public authenticated (CLPAEKS) not only simplifies certificate management but also could resist guessing attacks (KGA). In this paper, we analyze security models two recent CLPAEKS schemes find that they ignore threat that, upon capturing trapdoors, adversary directly compare distinguish whether are generated using same keyword. To cope threat, propose improved model define notion strong trapdoor indistinguishability. We then new scheme prove be under based on intractability DBDH problem DDH targeted bilinear group.
منابع مشابه
High-Speed High-Security Public Key Encryption with Keyword Search
Data privacy is one of the main concerns for clients who rely on cloud storage services. Standard encryption techniques can offer confidentiality; however, they prevent search capabilities over the encrypted data, thereby significantly degrading the utilization of cloud storage services. Public key Encryption with Keyword Search (PEKS) schemes offer encrypted search functionality to mitigate th...
متن کاملPublic Key Encryption with Keyword Search Revisited
The public key encryption with keyword search (PEKS) scheme recently proposed by Boneh, Di Crescenzo, Ostrovsky, and Persiano enables one to search encrypted keywords without compromising the security of the original data. In this paper, we address three important issues of a PEKS scheme, “refreshing keywords”, “removing secure channel”, and “processing multiple keywords”, which have not been c...
متن کاملPublic Key Encryption with Keyword Search
We study the problem of searching on data that is encrypted using a public key system. Consider user Bob who sends email to user Alice encrypted under Alice’s public key. An email gateway wants to test whether the email contains the keyword “urgent” so that it could route the email accordingly. Alice, on the other hand does not wish to give the gateway the ability to decrypt all her messages. W...
متن کاملPublic-Key Encryption with Registered Keyword Search
Public-key Encryption with Keyword Search (PEKS) enables a server to test whether a tag from a sender and a trapdoor from a receiver contain the same keyword. In this paper, we highlight some potential security concern, i.e. a curious server is able to answer whether any selected keyword is corresponding to a given trapdoor or not (called an offline keyword guessing attack). The existing semant...
متن کاملEfficient Certificateless Public Key Encryption
In [3] Al-Riyami and Paterson introduced the notion of “Certificateless Public Key Cryptography” and presented an instantiation. In this paper, we revisit the formulation of certificateless public key encryption and construct a more efficient scheme and then extend it to an authenticated encryption.
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Information
سال: 2023
ISSN: ['2078-2489']
DOI: https://doi.org/10.3390/info14030142