An Efficient and Secure Public Key Authenticated Encryption With Keyword Search in the Logarithmic Time
Searchable encryption is an important cryptographic technique that achieves data security and keyword retrieval over encrypted data in cloud. In 2004, Boneh et.al proposed the first searchable encryption scheme based on asymmetric cryptography. Since then, many variants of public key searchable encr...
Guardado en:
Autores principales: | , , , , |
---|---|
Formato: | article |
Lenguaje: | EN |
Publicado: |
IEEE
2021
|
Materias: | |
Acceso en línea: | https://doaj.org/article/6e510a98050f4492ae033869a4e73e48 |
Etiquetas: |
Agregar Etiqueta
Sin Etiquetas, Sea el primero en etiquetar este registro!
|
id |
oai:doaj.org-article:6e510a98050f4492ae033869a4e73e48 |
---|---|
record_format |
dspace |
spelling |
oai:doaj.org-article:6e510a98050f4492ae033869a4e73e482021-11-17T00:01:08ZAn Efficient and Secure Public Key Authenticated Encryption With Keyword Search in the Logarithmic Time2169-353610.1109/ACCESS.2021.3126867https://doaj.org/article/6e510a98050f4492ae033869a4e73e482021-01-01T00:00:00Zhttps://ieeexplore.ieee.org/document/9610080/https://doaj.org/toc/2169-3536Searchable encryption is an important cryptographic technique that achieves data security and keyword retrieval over encrypted data in cloud. In 2004, Boneh et.al proposed the first searchable encryption scheme based on asymmetric cryptography. Since then, many variants of public key searchable encryption schemes were proposed. However, most previous works are vulnerable to multi-ciphertext attack, and they cannot provide trapdoor indistinguishability. Another problem is how to improve the searching efficiency. To deal with two issues, we construct a fast and secure public key authenticated searchable encryption scheme with designed server. Our scheme can resist keyword guessing attacks, chosen multi-keyword attacks and multi-trapdoor attacks. The search function in our scheme achieves the logarithmic search time in number of keywords while most existing schemes required the linear time. By comparison with previous schemes in computational complexity, our scheme is very fast in keyword search.Lidong HanJunling GuoGuang YangQi XieChengliang TianIEEEarticleSearchable encryptiontrapdoor indistinguishabilitykeyword guessing attackDiffie–Hellman assumptionElectrical engineering. Electronics. Nuclear engineeringTK1-9971ENIEEE Access, Vol 9, Pp 151245-151253 (2021) |
institution |
DOAJ |
collection |
DOAJ |
language |
EN |
topic |
Searchable encryption trapdoor indistinguishability keyword guessing attack Diffie–Hellman assumption Electrical engineering. Electronics. Nuclear engineering TK1-9971 |
spellingShingle |
Searchable encryption trapdoor indistinguishability keyword guessing attack Diffie–Hellman assumption Electrical engineering. Electronics. Nuclear engineering TK1-9971 Lidong Han Junling Guo Guang Yang Qi Xie Chengliang Tian An Efficient and Secure Public Key Authenticated Encryption With Keyword Search in the Logarithmic Time |
description |
Searchable encryption is an important cryptographic technique that achieves data security and keyword retrieval over encrypted data in cloud. In 2004, Boneh et.al proposed the first searchable encryption scheme based on asymmetric cryptography. Since then, many variants of public key searchable encryption schemes were proposed. However, most previous works are vulnerable to multi-ciphertext attack, and they cannot provide trapdoor indistinguishability. Another problem is how to improve the searching efficiency. To deal with two issues, we construct a fast and secure public key authenticated searchable encryption scheme with designed server. Our scheme can resist keyword guessing attacks, chosen multi-keyword attacks and multi-trapdoor attacks. The search function in our scheme achieves the logarithmic search time in number of keywords while most existing schemes required the linear time. By comparison with previous schemes in computational complexity, our scheme is very fast in keyword search. |
format |
article |
author |
Lidong Han Junling Guo Guang Yang Qi Xie Chengliang Tian |
author_facet |
Lidong Han Junling Guo Guang Yang Qi Xie Chengliang Tian |
author_sort |
Lidong Han |
title |
An Efficient and Secure Public Key Authenticated Encryption With Keyword Search in the Logarithmic Time |
title_short |
An Efficient and Secure Public Key Authenticated Encryption With Keyword Search in the Logarithmic Time |
title_full |
An Efficient and Secure Public Key Authenticated Encryption With Keyword Search in the Logarithmic Time |
title_fullStr |
An Efficient and Secure Public Key Authenticated Encryption With Keyword Search in the Logarithmic Time |
title_full_unstemmed |
An Efficient and Secure Public Key Authenticated Encryption With Keyword Search in the Logarithmic Time |
title_sort |
efficient and secure public key authenticated encryption with keyword search in the logarithmic time |
publisher |
IEEE |
publishDate |
2021 |
url |
https://doaj.org/article/6e510a98050f4492ae033869a4e73e48 |
work_keys_str_mv |
AT lidonghan anefficientandsecurepublickeyauthenticatedencryptionwithkeywordsearchinthelogarithmictime AT junlingguo anefficientandsecurepublickeyauthenticatedencryptionwithkeywordsearchinthelogarithmictime AT guangyang anefficientandsecurepublickeyauthenticatedencryptionwithkeywordsearchinthelogarithmictime AT qixie anefficientandsecurepublickeyauthenticatedencryptionwithkeywordsearchinthelogarithmictime AT chengliangtian anefficientandsecurepublickeyauthenticatedencryptionwithkeywordsearchinthelogarithmictime AT lidonghan efficientandsecurepublickeyauthenticatedencryptionwithkeywordsearchinthelogarithmictime AT junlingguo efficientandsecurepublickeyauthenticatedencryptionwithkeywordsearchinthelogarithmictime AT guangyang efficientandsecurepublickeyauthenticatedencryptionwithkeywordsearchinthelogarithmictime AT qixie efficientandsecurepublickeyauthenticatedencryptionwithkeywordsearchinthelogarithmictime AT chengliangtian efficientandsecurepublickeyauthenticatedencryptionwithkeywordsearchinthelogarithmictime |
_version_ |
1718426054377340928 |