An Efficient and Secure Public Key Authenticated Encryption With Keyword Search in the Logarithmic Time

Searchable encryption is an important cryptographic technique that achieves data security and keyword retrieval over encrypted data in cloud. In 2004, Boneh et.al proposed the first searchable encryption scheme based on asymmetric cryptography. Since then, many variants of public key searchable encr...

Descripción completa

Guardado en:
Detalles Bibliográficos
Autores principales: Lidong Han, Junling Guo, Guang Yang, Qi Xie, Chengliang Tian
Formato: article
Lenguaje:EN
Publicado: IEEE 2021
Materias:
Acceso en línea:https://doaj.org/article/6e510a98050f4492ae033869a4e73e48
Etiquetas: Agregar Etiqueta
Sin Etiquetas, Sea el primero en etiquetar este registro!
id oai:doaj.org-article:6e510a98050f4492ae033869a4e73e48
record_format dspace
spelling oai:doaj.org-article:6e510a98050f4492ae033869a4e73e482021-11-17T00:01:08ZAn Efficient and Secure Public Key Authenticated Encryption With Keyword Search in the Logarithmic Time2169-353610.1109/ACCESS.2021.3126867https://doaj.org/article/6e510a98050f4492ae033869a4e73e482021-01-01T00:00:00Zhttps://ieeexplore.ieee.org/document/9610080/https://doaj.org/toc/2169-3536Searchable encryption is an important cryptographic technique that achieves data security and keyword retrieval over encrypted data in cloud. In 2004, Boneh et.al proposed the first searchable encryption scheme based on asymmetric cryptography. Since then, many variants of public key searchable encryption schemes were proposed. However, most previous works are vulnerable to multi-ciphertext attack, and they cannot provide trapdoor indistinguishability. Another problem is how to improve the searching efficiency. To deal with two issues, we construct a fast and secure public key authenticated searchable encryption scheme with designed server. Our scheme can resist keyword guessing attacks, chosen multi-keyword attacks and multi-trapdoor attacks. The search function in our scheme achieves the logarithmic search time in number of keywords while most existing schemes required the linear time. By comparison with previous schemes in computational complexity, our scheme is very fast in keyword search.Lidong HanJunling GuoGuang YangQi XieChengliang TianIEEEarticleSearchable encryptiontrapdoor indistinguishabilitykeyword guessing attackDiffie–Hellman assumptionElectrical engineering. Electronics. Nuclear engineeringTK1-9971ENIEEE Access, Vol 9, Pp 151245-151253 (2021)
institution DOAJ
collection DOAJ
language EN
topic Searchable encryption
trapdoor indistinguishability
keyword guessing attack
Diffie–Hellman assumption
Electrical engineering. Electronics. Nuclear engineering
TK1-9971
spellingShingle Searchable encryption
trapdoor indistinguishability
keyword guessing attack
Diffie–Hellman assumption
Electrical engineering. Electronics. Nuclear engineering
TK1-9971
Lidong Han
Junling Guo
Guang Yang
Qi Xie
Chengliang Tian
An Efficient and Secure Public Key Authenticated Encryption With Keyword Search in the Logarithmic Time
description Searchable encryption is an important cryptographic technique that achieves data security and keyword retrieval over encrypted data in cloud. In 2004, Boneh et.al proposed the first searchable encryption scheme based on asymmetric cryptography. Since then, many variants of public key searchable encryption schemes were proposed. However, most previous works are vulnerable to multi-ciphertext attack, and they cannot provide trapdoor indistinguishability. Another problem is how to improve the searching efficiency. To deal with two issues, we construct a fast and secure public key authenticated searchable encryption scheme with designed server. Our scheme can resist keyword guessing attacks, chosen multi-keyword attacks and multi-trapdoor attacks. The search function in our scheme achieves the logarithmic search time in number of keywords while most existing schemes required the linear time. By comparison with previous schemes in computational complexity, our scheme is very fast in keyword search.
format article
author Lidong Han
Junling Guo
Guang Yang
Qi Xie
Chengliang Tian
author_facet Lidong Han
Junling Guo
Guang Yang
Qi Xie
Chengliang Tian
author_sort Lidong Han
title An Efficient and Secure Public Key Authenticated Encryption With Keyword Search in the Logarithmic Time
title_short An Efficient and Secure Public Key Authenticated Encryption With Keyword Search in the Logarithmic Time
title_full An Efficient and Secure Public Key Authenticated Encryption With Keyword Search in the Logarithmic Time
title_fullStr An Efficient and Secure Public Key Authenticated Encryption With Keyword Search in the Logarithmic Time
title_full_unstemmed An Efficient and Secure Public Key Authenticated Encryption With Keyword Search in the Logarithmic Time
title_sort efficient and secure public key authenticated encryption with keyword search in the logarithmic time
publisher IEEE
publishDate 2021
url https://doaj.org/article/6e510a98050f4492ae033869a4e73e48
work_keys_str_mv AT lidonghan anefficientandsecurepublickeyauthenticatedencryptionwithkeywordsearchinthelogarithmictime
AT junlingguo anefficientandsecurepublickeyauthenticatedencryptionwithkeywordsearchinthelogarithmictime
AT guangyang anefficientandsecurepublickeyauthenticatedencryptionwithkeywordsearchinthelogarithmictime
AT qixie anefficientandsecurepublickeyauthenticatedencryptionwithkeywordsearchinthelogarithmictime
AT chengliangtian anefficientandsecurepublickeyauthenticatedencryptionwithkeywordsearchinthelogarithmictime
AT lidonghan efficientandsecurepublickeyauthenticatedencryptionwithkeywordsearchinthelogarithmictime
AT junlingguo efficientandsecurepublickeyauthenticatedencryptionwithkeywordsearchinthelogarithmictime
AT guangyang efficientandsecurepublickeyauthenticatedencryptionwithkeywordsearchinthelogarithmictime
AT qixie efficientandsecurepublickeyauthenticatedencryptionwithkeywordsearchinthelogarithmictime
AT chengliangtian efficientandsecurepublickeyauthenticatedencryptionwithkeywordsearchinthelogarithmictime
_version_ 1718426054377340928