Paper 2022/1374

Efficient Public Key Searchable Encryption Schemes from Standard Hard Lattice Problems for Cloud Computing

Lijun Qi
Jincheng Zhuang
Abstract

Cloud storage and computing offers significant convenience and management efficiency in the information era. Privacy protection is a major challenge in cloud computing. Public key encryption with keyword search (PEKS) is an ingenious tool for ensuring privacy and functionality in certain scenario, such as ensuring privacy for data retrieval appearing in the cloud computing. Despite many attentions received, PEKS schemes still face several challenges in practical applications, such as low computational efficiency, high end-to-end delay, vulnerability to inside keyword guessing attacks(IKGA) and key management defects in the multi-user environment. In this work, we introduce three Ring-LWE/ISIS based PEKS schemes: (1) Our basic PEKS scheme achieves high level security in the standard model. (2) Our PAEKS scheme utilizes the sender's private key to generate an authentication when encrypting, which can resist IKGA. (3) Our IB-PAEKS scheme not only can resist IKGA, but also significantly reduces the complexity of key management in practical applications. Experimental results indicate that the first scheme provides lower end-to-end delay and higher computational efficiency compared to similar ones, and that our last two schemes can provide more secure properties with little additional overhead.

Metadata
Available format(s)
PDF
Category
Public-key cryptography
Publication info
Preprint.
Keywords
Cloud computing Searchable encryption Authentication Keyword guessing attacks Ring-LWE/ISIS
Contact author(s)
qilijun @ mail sdu edu cn
jzhuang @ sdu edu cn
History
2022-10-14: approved
2022-10-12: received
See all versions
Short URL
https://ia.cr/2022/1374
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2022/1374,
      author = {Lijun Qi and Jincheng Zhuang},
      title = {Efficient Public Key Searchable Encryption Schemes from Standard Hard Lattice Problems for Cloud Computing},
      howpublished = {Cryptology ePrint Archive, Paper 2022/1374},
      year = {2022},
      note = {\url{https://eprint.iacr.org/2022/1374}},
      url = {https://eprint.iacr.org/2022/1374}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.