Abstract

Fine-grained public key encryption with keyword search (PEKS), allowing users to search on encrypted data with flexible access control policy, has been widely studied recently due to its promising application to real-world scenarios such as cloud computing. However, most of the existing fine-grained PEKS schemes are either only able to support single access control (e.g., attribute-based access control) or susceptible to being attacked or compromised by quantum computers in or after a short time. In this paper, we propose a fine-grained PEKS scheme that o ers dual access control based on lattice. In particular, we first define a dual fine-grained PEKS primitive against chosen keyword attacks under selective security. Subsequently, we adapt the key homomorphic technique and noise rerandomization technique to design a concrete scheme. Particularly, the keyword space in our construction is unlimited. Then, we present a formal security proof against chosen keyword attacks on the learning with errors (LWE) problem in the standard model. Moreover, we demonstrate the theoretical performance and experimental result of our proposed scheme. Finally, we discuss that our scheme can be easily extended to support conjunctive keywords and delegation without incurring complex operations.

Highlights

  • Public-key encryption with keyword search (PEKS), first proposed by Boneh et al (2004), allows users to search encrypted files by specific keywords with data privacy

  • Fine-grained public key encryption with keyword search (PEKS), allowing users to search on encrypted data with flexible access control policy, has been widely studied recently due to its promising application to real-world scenarios such as cloud computing

  • We propose a fine-grained PEKS scheme that offers dual access control based on lattice

Read more

Summary

Introduction

Public-key encryption with keyword search (PEKS), first proposed by Boneh et al (2004), allows users to search encrypted files by specific keywords with data privacy. In more real-world scenarios, we need some cryptographic primitives with access control to realize fine-grained schemes. Data senders need to flexibly control the search permission of data receivers, such that only by matching the attribute or the identity can data receivers search successfully, which is non-negligible in practical cloud computing. In cloud computing, dual access control can comprise attribute-based access control for the user authentication and inner product access control for verification (Sheng, Wen, Guo, & Yin, 2013). The existing lattice-based fine-grained PEKS scheme only offers single access control (Li, Ma, Zhang, Fan, & Li, 2019). We are motivated to design the lattice-based PEKS scheme with fine-grained access control that supports dual access control

Contribution
Related Works
Paper Organization
Preliminaries
Definition and Security Model
Our Construction
Security Analysis
Theoretical Performance
Experimental Evaluation
Extensions and Discussions
Conclusions
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call