Verifiable key-aggregate searchable encryption with a designated server in multi-owner setting
Liu, Jinlu ORCID: 0000-0003-1186-8545 , Wei, Zhongkai, Qin, Jing ORCID: 0000-0003-2380-0396 , Zhao, Bo and Ma, Jixin (2023) Verifiable key-aggregate searchable encryption with a designated server in multi-owner setting. IEEE Transactions on Services Computing, 16 (6). pp. 4233-4247. ISSN 1939-1374 (Online) (doi:https://doi.org/10.1109/TSC.2023.3315957)
|
PDF (AAM)
44481_MA_Verifiable_key_aggregate_searchable_encryption_with_a_designated_server_in_multi_owner_setting.pdf - Accepted Version Download (2MB) | Preview |
Abstract
Key-aggregate searchable encryption (KASE) schemes support selective data sharing and keyword-based ciphertext searching by using the constant-size shared key and trapdoor, making these schemes attractive for resource-constrained users to store, share, and search encrypted data in public clouds. However, most previously proposed KASE schemes suffer from our proposed "off-line keyword guessing attack (KGA)" and some other weaknesses. Consequently, they fail to gain the keyword ciphertext indistinguishability and trapdoor indistinguishability, which are vital security goals of searchable encryption. Inspired by the relationship of public key encryption with keyword search (PEKS) and KASE, we design a new KASE scheme called key-aggregate searchable encryption with a designated server (dKASE). The dKASE scheme achieves our proposed keyword ciphertext indistinguishability against chosen keyword attack (KC-IND-CKA) and keyword trapdoor indistinguishability against keyword guessing attack (KT-IND-KGA) security models, where the latter model captures off-line KGA. Then, we extend the dKASE scheme to verifiable dKASE in multi-owner setting (dVKASEM) scheme. With dVKASEM, when multiple data owners authorize a user to access data, the user merely needs to store his single key and generate a single trapdoor to query these owners’ data. Besides, the adoption of the aggregate signature significantly reduces the overhead of verifying whether data has been tampered with. Performance analysis illustrates that our schemes are efficient.
Item Type: | Article |
---|---|
Uncontrolled Keywords: | selective data sharing; key-aggregate searchable encryption; KGA; multi-owner; verifiable |
Subjects: | Q Science > QA Mathematics > QA75 Electronic computers. Computer science Q Science > QA Mathematics > QA76 Computer software T Technology > T Technology (General) |
Faculty / School / Research Centre / Research Group: | Faculty of Engineering & Science Faculty of Engineering & Science > School of Computing & Mathematical Sciences (CMS) |
Last Modified: | 21 Dec 2023 15:23 |
URI: | http://gala.gre.ac.uk/id/eprint/44481 |
Actions (login required)
View Item |
Downloads
Downloads per month over past year