Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1007/978-3-031-29371-9_8guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

Public Key Encryption with Hierarchical Authorized Keyword Search

Published: 31 March 2023 Publication History

Abstract

Public key encryption with keyword search (PEKS), which was introduced by Boneh et al. at EUROCRYPT’ 04, is a breakthrough approach to searching encrypted data under a public key setting. In this cryptographic primitive, senders can generate searchable ciphertexts for specific keywords to be retrieved from a given document; receivers can generate corresponding trapdoors for search by using their private keys. Recently, Jiang et al. (ACISP’ 16) proposed an improved PEKS scheme called public key encryption with authorized keyword search (PEAKS); this scheme enables authorized users to generate trapdoors for specific sets of keywords even if these users do not have access to the private key. Unfortunately, authorized users cannot delegate this power to other unauthorized users because the authorization in PEAKS is insufficiently flexible; therefore, this scheme is not suitable for enterprise scenarios in general. In this work, we introduce a novel cryptographic primitive called public key encryption with hierarchical authorized keyword search (PEHAKS) to solve this problem. In contrast to PEAKS, the proposed primitive enables authorized users to further hierarchically delegate their power of generating trapdoors to unauthorized users. We formally define the system model of PEHAKS under a multikeyword setting, and the security requirements are designed to withstand attacks in a real scenario. Furthermore, we propose a provably secure scheme using the technique of dual pairing vector spaces and demonstrate that the scheme is secure under the hardness of the n-extended decisional Diffie–Hellman assumption. Therefore, the proposed scheme is secure and can be applied in scenarios that require hierarchical authorization. To the best of the authors’ knowledge, no PEKS variant schemes with this property have been previously designed.

References

[1]
Abdalla M Shoup V Searchable encryption revisited: consistency properties, relation to anonymous IBE, and extensions Advances in Cryptology – CRYPTO 2005 2005 Heidelberg Springer 205-222
[2]
Abdalla M, De Caro A, and Phan DH Generalized key delegation for wildcarded identity-based and inner-product encryption IEEE Trans. Inf. Forensics Secur. 2012 7 6 1695-1706
[3]
Abu-Libdeh, H., Princehouse, L., Weatherspoon, H.: RACS: a case for cloud storage diversity. In: ACM Symposium on Cloud Computing (2010)
[4]
Boneh, D., Crescenzo, G.D., Ostrovsky, R., Persiano, G.: Public key encryption with keyword search. In: EUROCRYPT (2004)
[5]
Chen R et al. Server-aided public key encryption with keyword search IEEE Trans. Inf. Forensics Secur. 2016 11 12 2833-2842
[6]
Conway, J.H.: Atlas of Finite Groups: Maximal Subgroups and Ordinary Characters for Simple Groups. Oxford University Press (1985)
[7]
Goldwasser S, Micali S, and Rivest RL A digital signature scheme secure against adaptive chosen-message attacks SIAM J. Comput. 1988 17 2 281-308
[8]
Hayes, B.: Cloud computing (2008)
[9]
Jiang, P., Mu, Y., Guo, F., Wen, Q.: Public key encryption with authorized keyword search. In: ACISP (2016)
[10]
Johnson D, Menezes A, and Vanstone S The elliptic curve digital signature algorithm (ECDSA) Int. J. Inf. Secur. 2001 1 1 36-63
[11]
Lewko, A., Okamoto, T., Sahai, A., Takashima, K., Waters, B.: Fully secure functional encryption: attribute-based encryption and (hierarchical) inner product encryption. In: EUROCRYPT (2010)
[12]
Liu ZY, Tseng YF, Tso R, Chen YC, and Mambo M Identity-certifying authority-aided identity-based searchable encryption framework in cloud systems IEEE Syst. J. 2021 16 4629-4640
[13]
Okamoto, T., Takashima, K.: Hierarchical predicate encryption for inner-products. In: EUROCRYPT (2009)
[14]
Okamoto T and Takashima K Rabin T Fully secure functional encryption with general relations from the decisional linear assumption Advances in Cryptology – CRYPTO 2010 2010 Heidelberg Springer 191-208
[15]
Qian, L., Luo, Z., Du, Y., Guo, L.: Cloud computing: an overview. In: IEEE International Conference on Cloud Computing (2009)
[16]
Qin B, Chen Y, Huang Q, Liu X, and Zheng D Public-key authenticated encryption with keyword search revisited: Security model and constructions Inf. Sci. 2020 516 515-528
[17]
Wang, J., Chow, S.S.: Omnes pro uno: practical multi-writer encrypted database. In: USENIX Security (2022)
[18]
Wang P, Chen B, Xiang T, and Wang Z Lattice-based public key searchable encryption with fine-grained access control for edge computing Futur. Gener. Comput. Syst. 2022 127 373-383
[19]
Wang T, Quan Y, Shen XS, Gadekallu TR, Wang W, and Dev K A privacy-enhanced retrieval technology for the cloud-assisted internet of things IEEE Trans. Industrial Inform. 2021 18 4981-4989
[20]
Waters B Halevi S Dual system encryption: realizing fully secure IBE and HIBE under simple assumptions Advances in Cryptology - CRYPTO 2009 2009 Heidelberg Springer 619-636
[21]
Wei L et al. Security and privacy for storage and computation in cloud computing Inf. Sci. 2014 258 371-386

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image Guide Proceedings
Information Security and Cryptology – ICISC 2022: 25th International Conference, ICISC 2022, Seoul, South Korea, November 30 – December 2, 2022, Revised Selected Papers
Nov 2022
513 pages
ISBN:978-3-031-29370-2
DOI:10.1007/978-3-031-29371-9

Publisher

Springer-Verlag

Berlin, Heidelberg

Publication History

Published: 31 March 2023

Author Tags

  1. Authorization
  2. Hierarchical
  3. Multikeyword Search
  4. Public Key Encryption

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • 0
    Total Citations
  • 0
    Total Downloads
  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 16 Nov 2024

Other Metrics

Citations

View Options

View options

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media