Lattice-based proxy-oriented identity-based encryption with keyword search for cloud storage
Public-key encryption with keyword search (PEKS) enables users to search over encrypted data and retrieve target data efficiently. However, most of existing PEKS schemes are vulnerable to adversaries equipped with quantum computers in the near future, and even incur complex certificate management pr...
Saved in:
Main Authors: | , , , , , |
---|---|
Other Authors: | |
Format: | Article |
Language: | English |
Published: |
2020
|
Subjects: | |
Online Access: | https://hdl.handle.net/10356/142923 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Nanyang Technological University |
Language: | English |
id |
sg-ntu-dr.10356-142923 |
---|---|
record_format |
dspace |
spelling |
sg-ntu-dr.10356-1429232023-02-28T19:49:08Z Lattice-based proxy-oriented identity-based encryption with keyword search for cloud storage Zhang, Xiaojun Tang, Yao Wang, Huaxiong Xu, Chunxiang Miao, Yinbin Cheng, Hang School of Physical and Mathematical Sciences Research Techno Plaza Science::Mathematics Proxy-oriented Identity-based Encryption Public-key encryption with keyword search (PEKS) enables users to search over encrypted data and retrieve target data efficiently. However, most of existing PEKS schemes are vulnerable to adversaries equipped with quantum computers in the near future, and even incur complex certificate management procedures due to the public key infrastructure (PKI). To this end, we propose a proxy-oriented identity-based encryption with keyword search (PO-IBEKS) scheme from lattices for cloud storage, which is post-quantum secure. In PO-IBEKS, an original data owner authorizes a proxy to encrypt sensitive data as well as corresponding keywords and upload ciphertexts to clouds, which alleviates the data processing burden on the original data owner. Besides, PO-IBEKS can resist inside keyword guessing attacks (IKGA) from misbehaved cloud servers by integrating the learning with errors (LWE) encryption and preimage sampleable function. Each entity in PO-IBEKS is identified with her/his recognizable information, thereby eliminating managing certificates. Formal security analysis proves that PO-IBEKS can achieve ciphertext indistinguishability, existential unforgeability, and delegation security. Experimental results demonstrate PO-IBEKS is much more practical when compared with existing schemes. Accepted version 2020-07-13T01:44:21Z 2020-07-13T01:44:21Z 2019 Journal Article Zhang, X., Tang, Y., Wang, H., Xu, C., Miao, Y., & Cheng, H. (2019). Lattice-based proxy-oriented identity-based encryption with keyword search for cloud storage. Information Sciences, 494, 193-207. doi:10.1016/j.ins.2019.04.051 0020-0255 https://hdl.handle.net/10356/142923 10.1016/j.ins.2019.04.051 494 193 207 en Information Sciences © 2019 Elsevier Inc. All rights reserved. This paper was published in Information Sciences and is made available with permission of Elsevier Inc. application/pdf |
institution |
Nanyang Technological University |
building |
NTU Library |
continent |
Asia |
country |
Singapore Singapore |
content_provider |
NTU Library |
collection |
DR-NTU |
language |
English |
topic |
Science::Mathematics Proxy-oriented Identity-based Encryption |
spellingShingle |
Science::Mathematics Proxy-oriented Identity-based Encryption Zhang, Xiaojun Tang, Yao Wang, Huaxiong Xu, Chunxiang Miao, Yinbin Cheng, Hang Lattice-based proxy-oriented identity-based encryption with keyword search for cloud storage |
description |
Public-key encryption with keyword search (PEKS) enables users to search over encrypted data and retrieve target data efficiently. However, most of existing PEKS schemes are vulnerable to adversaries equipped with quantum computers in the near future, and even incur complex certificate management procedures due to the public key infrastructure (PKI). To this end, we propose a proxy-oriented identity-based encryption with keyword search (PO-IBEKS) scheme from lattices for cloud storage, which is post-quantum secure. In PO-IBEKS, an original data owner authorizes a proxy to encrypt sensitive data as well as corresponding keywords and upload ciphertexts to clouds, which alleviates the data processing burden on the original data owner. Besides, PO-IBEKS can resist inside keyword guessing attacks (IKGA) from misbehaved cloud servers by integrating the learning with errors (LWE) encryption and preimage sampleable function. Each entity in PO-IBEKS is identified with her/his recognizable information, thereby eliminating managing certificates. Formal security analysis proves that PO-IBEKS can achieve ciphertext indistinguishability, existential unforgeability, and delegation security. Experimental results demonstrate PO-IBEKS is much more practical when compared with existing schemes. |
author2 |
School of Physical and Mathematical Sciences |
author_facet |
School of Physical and Mathematical Sciences Zhang, Xiaojun Tang, Yao Wang, Huaxiong Xu, Chunxiang Miao, Yinbin Cheng, Hang |
format |
Article |
author |
Zhang, Xiaojun Tang, Yao Wang, Huaxiong Xu, Chunxiang Miao, Yinbin Cheng, Hang |
author_sort |
Zhang, Xiaojun |
title |
Lattice-based proxy-oriented identity-based encryption with keyword search for cloud storage |
title_short |
Lattice-based proxy-oriented identity-based encryption with keyword search for cloud storage |
title_full |
Lattice-based proxy-oriented identity-based encryption with keyword search for cloud storage |
title_fullStr |
Lattice-based proxy-oriented identity-based encryption with keyword search for cloud storage |
title_full_unstemmed |
Lattice-based proxy-oriented identity-based encryption with keyword search for cloud storage |
title_sort |
lattice-based proxy-oriented identity-based encryption with keyword search for cloud storage |
publishDate |
2020 |
url |
https://hdl.handle.net/10356/142923 |
_version_ |
1759855198927323136 |