Abstract
With the growing popularity of cloud computing, searchable encryption has become centre of attraction to enhance privacy and usability of the shared data. First searchable encryption scheme under the public key setting was proposed by Bonah et al. which is known as PEKS. In the PEKS scheme, one can easily link between ciphertext and the trapdoor. In Information Sciences 2017 paper, Huang et al. proposed a public key SE scheme. In this scheme, encryption of a document or keyword requires the secret key of the data sender. The data sender generates ciphertexts, and upload them onto the cloud server. The data receiver generates trapdoors depending upon the public key of the sender and its own secretkey. Thus, the PEKS scheme of Huang et al. circumvents the above attack by linking the ciphertext and the trapdoor to the key of the sender. However no work is available in the literature to stop attacks against linking user key and cipher text and server key and ciphertext. In this paper we address these issues. We formalize the two new security notions, namely UKI-security and SKI-security. We have shown that our scheme is secure under these newly introduced security notions.
Original language | English |
---|---|
Title of host publication | Proceedings of the 2nd International Conference IOT, Blockchain and Cryptography, IOTBC 2024 |
Publisher | Academy and Industry Research Collaboration Center (AIRCC) |
Pages | 67-86 |
DOIs | |
Publication status | Published - 01 Apr 2024 |
Event | 2nd International Conference IOT, Blockchain and Cryptography 2024 - virtual, online Duration: 09 Mar 2024 → 10 Mar 2024 http://iotbc2024.org |
Publication series
Name | International Journal on Cybernetics and Informatics |
---|---|
Publisher | Academy and Industry Research Collaboration Center (AIRCC) |
Number | 2 |
Volume | 13 |
ISSN (Print) | 2320-8430 |
Conference
Conference | 2nd International Conference IOT, Blockchain and Cryptography 2024 |
---|---|
Abbreviated title | IOTBC 2024 |
Period | 09/03/2024 → 10/03/2024 |
Internet address |
Keywords
- searchable encryption
- PEKS
- Adaptive Security