Skip navigation

Verifiable key-aggregate searchable encryption with a designated server in multi-owner setting

Verifiable key-aggregate searchable encryption with a designated server in multi-owner setting

Liu, Jinlu ORCID logoORCID: https://orcid.org/0000-0003-1186-8545, Wei, Zhongkai, Qin, Jing ORCID logoORCID: https://orcid.org/0000-0003-2380-0396, Zhao, Bo and Ma, Jixin (2023) Verifiable key-aggregate searchable encryption with a designated server in multi-owner setting. IEEE Transactions on Services Computing, 16 (6). pp. 4233-4247. ISSN 1939-1374 (Online) (doi:10.1109/TSC.2023.3315957)

[thumbnail of AAM]
Preview
PDF (AAM)
44481_MA_Verifiable_key_aggregate_searchable_encryption_with_a_designated_server_in_multi_owner_setting.pdf - Accepted Version

Download (2MB) | Preview

Abstract

Key-aggregate searchable encryption (KASE) schemes support selective data sharing and keyword-based ciphertext searching by using the constant-size shared key and trapdoor, making these schemes attractive for resource-constrained users to store, share, and search encrypted data in public clouds. However, most previously proposed KASE schemes suffer from our proposed "off-line keyword guessing attack (KGA)" and some other weaknesses. Consequently, they fail to gain the keyword ciphertext indistinguishability and trapdoor indistinguishability, which are vital security goals of searchable encryption. Inspired by the relationship of public key encryption with keyword search (PEKS) and KASE, we design a new KASE scheme called key-aggregate searchable encryption with a designated server (dKASE). The dKASE scheme achieves our proposed keyword ciphertext indistinguishability against chosen keyword attack (KC-IND-CKA) and keyword trapdoor indistinguishability against keyword guessing attack (KT-IND-KGA) security models, where the latter model captures off-line KGA. Then, we extend the dKASE scheme to verifiable dKASE in multi-owner setting (dVKASEM) scheme. With dVKASEM, when multiple data owners authorize a user to access data, the user merely needs to store his single key and generate a single trapdoor to query these owners’ data. Besides, the adoption of the aggregate signature significantly reduces the overhead of verifying whether data has been tampered with. Performance analysis illustrates that our schemes are efficient.

Item Type: Article
Uncontrolled Keywords: selective data sharing; key-aggregate searchable encryption; KGA; multi-owner; verifiable
Subjects: Q Science > QA Mathematics > QA75 Electronic computers. Computer science
Q Science > QA Mathematics > QA76 Computer software
T Technology > T Technology (General)
Faculty / School / Research Centre / Research Group: Faculty of Engineering & Science
Faculty of Engineering & Science > School of Computing & Mathematical Sciences (CMS)
Last Modified: 21 Dec 2023 15:23
URI: http://gala.gre.ac.uk/id/eprint/44481

Actions (login required)

View Item View Item

Downloads

Downloads per month over past year

View more statistics