Paper 2023/1715
Lattice-based Public Key Encryption with Authorized Keyword Search: Construction, Implementation, and Applications
Abstract
Public key encryption with keyword search (PEKS), formalized by Boneh et al. [EUROCRYPT' 04], enables secure searching for specific keywords in the ciphertext. Nevertheless, in certain scenarios, varying user tiers are granted disparate data searching privileges, and administrators need to restrict the searchability of ciphertexts to select users exclusively. To address this concern, Jiang et al. [ACISP' 16] devised a variant of PEKS, namely public key encryption with authorized keyword search (PEAKS), wherein solely authorized users possess the ability to conduct targeted keyword searches. Nonetheless, it is vulnerable to resist quantum computing attacks. As a result, research focusing on authorizing users to search for keywords while achieving quantum security is far-reaching. In this work, we present a novel construction, namely lattice-based PEAKS (L-PEAKS), which is the first mechanism to permit the authority to authorize users to search different keyword sets while ensuring quantum-safe properties. Specifically, the keyword is encrypted with a public key, and each authorized user needs to obtain a search privilege from an authority. The authority distributes an authorized token to a user within a time period and the user will generate a trapdoor for any authorized keywords. Technically, we utilize several lattice sampling and basis extension algorithms to fight against attacks from quantum adversaries. Moreover, we leverage identity-based encryption (IBE) to alleviate the bottleneck of public key management. Furthermore, we conduct parameter analysis, security reduction, and theoretical complexity comparison of our scheme and perform comprehensive evaluations of a commodity machine for completeness. Our L-PEAKS satisfies IND-sID-CKA and T-EUF security and is efficient in terms of space and computation complexity compared to other existing primitives.
Metadata
- Available format(s)
- Category
- Public-key cryptography
- Publication info
- Preprint.
- Keywords
- Searchable encryptionAuthorizationData managementPost-quantum security
- Contact author(s)
-
syxu666 @ connect hku hk
yibocaobupt @ gmail com
xue-serena chen @ connect polyu hk
yuguo @ bnu edu cn
yueryang @ connect hku hk
guofangda @ ict ac cn
smyiu @ cs hku hk - History
- 2024-05-07: last of 2 revisions
- 2023-11-06: received
- See all versions
- Short URL
- https://ia.cr/2023/1715
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2023/1715, author = {Shiyuan Xu and Yibo Cao and Xue Chen and Yu Guo and Yuer Yang and Fangda Guo and Siu-Ming Yiu}, title = {Lattice-based Public Key Encryption with Authorized Keyword Search: Construction, Implementation, and Applications}, howpublished = {Cryptology {ePrint} Archive, Paper 2023/1715}, year = {2023}, url = {https://eprint.iacr.org/2023/1715} }