Public-Key Authenticated Encryption with Keyword Search: A Generic Construction and Its Quantum-Resistant Instantiation

Author:

Liu Zi-Yuan1,Tseng Yi-Fan1,Tso Raylin1,Mambo Masahiro2,Chen Yu-Chi3

Affiliation:

1. Department of Computer Science, National Chengchi University, Taipei 11605, Taiwan

2. Institute of Science and Engineering, Kanazawa University, Kanazawa 920-1192, Japan

3. Department of Computer Science and Engineering, Yuan Ze University, Taoyuan 32003, Taiwan

Abstract

Abstract The industrial Internet of Things (IIoT) integrates sensors, instruments, equipment and industrial applications, enabling traditional industries to automate and intelligently process data. To reduce the cost and demand of required service equipment, IIoT relies on cloud computing to further process and store data. Public-key encryption with keyword search (PEKS) plays an important role, due to its search functionality, to ensure the privacy and confidentiality of the outsourced data and the maintenance of flexibility in the use of the data. Recently, Huang and Li proposed the ‘public-key authenticated encryption with keyword search’ (PAEKS) to avoid the insider keyword guessing attacks (IKGAs) in the previous PEKS schemes. However, all current PAEKS schemes are based on the discrete logarithm assumption and are therefore vulnerable to quantum attacks. In this study, we first introduce a generic PAEKS construction, with the assistance of a trusted authority, that enjoys the security against IKGA in the standard model, if all building blocks are secure under standard model. Based on the framework, we further propose a novel instantiation of quantum-resistant PAEKS that is based on NTRU assumption under random oracle. Compared with its state-of-the-art counterparts, the experiment result indicates that our instantiation is more efficient and secure.

Funder

Ministry of Science and Technology, Taiwan

Publisher

Oxford University Press (OUP)

Subject

General Computer Science

Reference48 articles.

1. Searchable encryption revisited: Consistency properties, relation to anonymous IBE, and extensions;Abdalla;J. Cryptol.,2008

2. Efficient lattice (H)IBE in the standard model;Agrawal,2010

3. Quantum supremacy using a programmable superconducting processor;Arute;Nature,2019

4. Lattice-based public key searchable encryption from experimental perspectives;Behnia;IEEE Trans. Dependable Secure Comput.,2020

5. Non-interactive key exchange from identity-based encryption;Blazy,2018

Cited by 18 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3