Cryptology ePrint Archive: Report 2021/337

Identity-certifying Authority-aided Identity-based Searchable Encryption Framework in Cloud Systems

Zi-Yuan Liu and Yi-Fan Tseng and Raylin Tso and Yu-Chi Chen and Masahiro Mambo

Abstract: In the era of cloud computing, massive quantities of data are encrypted and uploaded to the cloud to realize a variety of applications and services while protecting user confidentiality. Accordingly, the formulation of methods for efficiently searching encrypted data has become a critical problem. Public-key encryption with keyword search is an efficient solution that allows the data owner to generate encrypted keywords for a given document while also allowing the data user to generate the corresponding trapdoor for searching. Huang and Li proposed a public-key authenticated encryption with keyword search (PAEKS) scheme to resist keyword guessing attacks, where the data owner not only encrypts keywords but also authenticates them. However, existing PAEKS-related schemes carry a trade-off between efficiency, storage cost, and security. In this paper, we introduce a novel framework, called identity-certifying authority-aided identity-based searchable encryption, which has the advantage of reducing storage space while remaining the efficiency and security. We formally define the system model and desired security requirements to represent attacks in a real scenario. In addition, we propose a provably secure scheme based on the gap bilinear Diffie--Hellman assumption and experimentally evaluate our scheme in terms of its performance and theoretical features against its state-of-the-art counterparts.

Category / Keywords: public-key cryptography / identity-certifying authority; cloud system; identity-based encryption; keyword search

Original Publication (in the same form): IEEE Systems Journal
DOI:
10.1109/JSYST.2021.3103909

Date: received 15 Mar 2021, last revised 30 Sep 2021

Contact author: zyliu at cs nccu edu tw

Available format(s): PDF | BibTeX Citation

Version: 20210930:050435 (All versions of this report)

Short URL: ia.cr/2021/337


[ Cryptology ePrint archive ]