Certificateless Public Key Authenticated Encryption with Keyword Search Achieving Stronger Security

نویسندگان

چکیده

Transforming data into ciphertexts and storing them in the cloud database is a secure way to simplify management. Public key encryption with keyword search (PEKS) an important cryptographic primitive as it provides ability for desired files among ciphertexts. As variant of PEKS, certificateless public authenticated (CLPAEKS) not only simplifies certificate management but also could resist guessing attacks (KGA). In this paper, we analyze security models two recent CLPAEKS schemes find that they ignore threat that, upon capturing trapdoors, adversary directly compare distinguish whether are generated using same keyword. To cope threat, propose improved model define notion strong trapdoor indistinguishability. We then new scheme prove be under based on intractability DBDH problem DDH targeted bilinear group.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

High-Speed High-Security Public Key Encryption with Keyword Search

Data privacy is one of the main concerns for clients who rely on cloud storage services. Standard encryption techniques can offer confidentiality; however, they prevent search capabilities over the encrypted data, thereby significantly degrading the utilization of cloud storage services. Public key Encryption with Keyword Search (PEKS) schemes offer encrypted search functionality to mitigate th...

متن کامل

Public Key Encryption with Keyword Search Revisited

The public key encryption with keyword search (PEKS) scheme recently proposed by Boneh, Di Crescenzo, Ostrovsky, and Persiano enables one to search encrypted keywords without compromising the security of the original data. In this paper, we address three important issues of a PEKS scheme, “refreshing keywords”, “removing secure channel”, and “processing multiple keywords”, which have not been c...

متن کامل

Public Key Encryption with Keyword Search

We study the problem of searching on data that is encrypted using a public key system. Consider user Bob who sends email to user Alice encrypted under Alice’s public key. An email gateway wants to test whether the email contains the keyword “urgent” so that it could route the email accordingly. Alice, on the other hand does not wish to give the gateway the ability to decrypt all her messages. W...

متن کامل

Public-Key Encryption with Registered Keyword Search

Public-key Encryption with Keyword Search (PEKS) enables a server to test whether a tag from a sender and a trapdoor from a receiver contain the same keyword. In this paper, we highlight some potential security concern, i.e. a curious server is able to answer whether any selected keyword is corresponding to a given trapdoor or not (called an offline keyword guessing attack). The existing semant...

متن کامل

Efficient Certificateless Public Key Encryption

In [3] Al-Riyami and Paterson introduced the notion of “Certificateless Public Key Cryptography” and presented an instantiation. In this paper, we revisit the formulation of certificateless public key encryption and construct a more efficient scheme and then extend it to an authenticated encryption.

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Information

سال: 2023

ISSN: ['2078-2489']

DOI: https://doi.org/10.3390/info14030142