Affiliation:
1. State Key Laboratory of Public Big Data, College of Computer Science and Technology, Guizhou University, Guiyang 550025, China
Abstract
Public key encryption with keyword search (PEKS) allows users to perform keyword searches of ciphertext on untrusted cloud storage servers, protecting data privacy while sharing data. However, it faces several security problems in practical applications. First, an attacker can launch a keyword guessing attack to obtain keywords of interest to users, causing the leakage of their sensitive information. Second, untrusted cloud servers may return incorrect or incomplete results. In addition, with the continuous development of quantum computers, existing PEKS schemes face the problem of quantum attacks. Since cloud servers are mostly untrusted, verifiable search has become a hot research topic among scholars. However, most of the current schemes are based on bilinear pairing constructions, which are vulnerable to quantum attacks. To solve these problems, we propose a new ciphertext retrieval scheme based on fully homomorphic encryption (FHE), called VR-PEKS. This scheme implements verifiable search and is able to solve the problems of keyword guessing attacks and quantum attacks. We propose to improve the security of the scheme by using the oblivious pseudorandom function to randomize keywords and then encrypt them using FHE. An encrypted verified index structure is constructed and exposed by the data owner, enabling the data recipient to achieve verification of the correctness and integrity of the retrieved results without relying on a trusted third party. We demonstrate the security of the proposed scheme in a stochastic prediction model, and prove that our scheme satisfies keyword ciphertext indistinguishability and keyword trapdoor indistinguishability under adaptive keyword selection attacks. The comparison shows that our scheme is secure and feasible.
Funder
National Natural Science Foundation of China
Education Department of Guizhou Province
Vocational Education Science Research Project of the Education Department of Guizhou Province
Subject
Fluid Flow and Transfer Processes,Computer Science Applications,Process Chemistry and Technology,General Engineering,Instrumentation,General Materials Science
Reference40 articles.
1. PSSPR: A source location privacy protection scheme based on sector phantom routing in WSNs;Chen;Int. J. Intell. Syst.,2022
2. An Entropy-View Secure Multiparty Computation Protocol Based on Semi-Honest Model;Luo;J. Organ. End User Comput.,2022
3. Song, D.X., Wagner, D., and Perrig, A. (2000, January 14–17). Practical techniques for searches on encrypted data. Proceedings of the 2000 IEEE Symposium on Security and Privacy, Berkeley, CA, USA.
4. KeySea: Keyword-Based Search With Receiver Anonymity in Attribute-Based Searchable Encryption;Chaudhari;IEEE Trans. Serv. Comput.,2022
5. Boneh, D., Di Crescenzo, G., Ostrovsky, R., and Persiano, G. (2004, January 2–6). Public key encryption with keyword search. Proceedings of the Advances in Cryptology—EUROCRYPT 2004: International Conference on the Theory and Applications of Cryptographic Techniques, Interlaken, Switzerland.
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献