Key-Aggregate Searchable Encryption, Revisited: Formal Foundations for Cloud Applications, and Their Implementation

08/29/2019
by   Masahiro Kamimura, et al.
0

In the use of a cloud storage, sharing of data with efficient access control is an important requirement in addition to data security and privacy. Cui et al. (IEEE Trans. on Comp. 2016) proposed key-aggregate searchable encryption (KASE), which allows a data owner to issue an aggregate key that enables a user to search in an authorized subset of encrypted files by generating an encrypted keyword called trapdoor. While the idea of KASE is elegant, to the best of our knowledge, its security has never been discussed formally. In this paper, we discuss the security of KASE formally and propose provably secure schemes. The construction of a secure KASE scheme is non-trivial, and we will show that the KASE scheme of Cui et al. is insecure under our definitions. We first introduce our provably secure scheme, named first construction, with respect to encrypted files and aggregate keys in a single-server setting. In comparison with the scheme of Cui et al., the first construction is secure without increased computational costs. Then, we introduce another provably secure scheme, named main construction, with respect to trapdoors in a two-server setting. The main construction guarantees the privacy of a search, encrypted files, and aggregate keys. Considering 5,000 encrypted files, the first construction can finish search within three seconds and the main construction can finish search within six seconds.

READ FULL TEXT

page 4

page 6

page 8

page 9

page 10

page 12

page 14

page 15

research
05/09/2020

Lattice-based public key encryption with equality test supporting flexible authorization in standard model

Public key encryption with equality test (PKEET) supports to check wheth...
research
09/16/2021

Compressed Oblivious Encoding for Homomorphically Encrypted Search

Fully homomorphic encryption (FHE) enables a simple, attractive framewor...
research
06/07/2018

Secure Multilayer Perceptron Based On Homomorphic Encryption

In this work, we propose an outsourced Secure Multilayer Perceptron (SML...
research
01/13/2022

Dynamic Local Searchable Symmetric Encryption

In this article, we tackle for the first time the problem of dynamic mem...
research
01/24/2018

Server-Aided Revocable Predicate Encryption: Formalization and Lattice-Based Instantiation

Efficient user revocation is a necessary but challenging problem in many...
research
01/07/2020

Provenance-based Classification Policy based on Encrypted Search

As an important type of cloud data, digital provenance is arousing incre...
research
05/14/2020

Lattice-based Unidirectional IBPRE Secure in Standard Model

Proxy re-encryption (PRE) securely enables the re-encryption of cipherte...

Please sign up or login with your details

Forgot password? Click here to reset