Paper 2023/1715

Post-Quantum Searchable Encryption Supporting User-Authorization for Outsourced Data Management

Shiyuan Xu, University of Hong Kong
Yibo Cao, Beijing University of Posts and Telecommunications
Xue Chen, Hong Kong Polytechnic University
Yu Guo, Beijing Normal University
Yuer Yang, University of Hong Kong
Fangda Guo, Institute of Computing Technology
Siu-Ming Yiu, University of Hong Kong
Abstract

With the widespread development of database systems, data security has become crucial when it comes to sharing among users and servers. A straightforward approach involves using searchable encryption to ensure the confidentiality of shared data. However, in certain scenarios, varying user tiers are granted disparate data searching privileges, and administrators need to restrict the searchability of ciphertexts to select users exclusively. To address this issue, public key encryption with authorized keyword search (PEAKS) was proposed, wherein solely authorized users possess the ability to conduct targeted keyword searches. Nonetheless, it is vulnerable to resist quantum computing attacks. As a result, research focusing on authorizing users to search for keywords while achieving quantum security is far-reaching. In this paper, we propose a lattice-based variant of PEAKS (L-PEAKS) that enables keyword dataset authorization for outsourced data management. Unlike existing schemes, our design incorporates identity-based encryption (IBE) to overcome the bottleneck of public key management. Besides, we utilize several lattice sampling algorithms to defend against attacks from quantum adversaries. Specifically, each authorized user must obtain a search privilege from an authority. The authority distributes an authorized token to the user within a specific time period, and the user generates a trapdoor for any authorized keywords. Our scheme is proven to be secure against IND-sID-CKA and T-EUF security in a quantum setting. We also conduct comprehensive evaluations on a commodity machine to assess completeness and provide theoretical complexity comparisons with existing state-of-the-art schemes.

Metadata
Available format(s)
PDF
Category
Public-key cryptography
Publication info
Preprint.
Keywords
Searchable encryptionAuthorizationData managementPost-quantum security
Contact author(s)
syxu666 @ connect hku hk
yibocaobupt @ gmail com
xue-serena chen @ connect polyu hk
yuguo @ bnu edu cn
yueryang @ connect hku hk
guofangda @ ict ac cn
smyiu @ cs hku hk
History
2024-04-30: revised
2023-11-06: received
See all versions
Short URL
https://ia.cr/2023/1715
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2023/1715,
      author = {Shiyuan Xu and Yibo Cao and Xue Chen and Yu Guo and Yuer Yang and Fangda Guo and Siu-Ming Yiu},
      title = {Post-Quantum Searchable Encryption Supporting User-Authorization for Outsourced Data Management},
      howpublished = {Cryptology ePrint Archive, Paper 2023/1715},
      year = {2023},
      note = {\url{https://eprint.iacr.org/2023/1715}},
      url = {https://eprint.iacr.org/2023/1715}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.