Skip to main content

A Pairing-Based Certificateless Authenticated Searchable Encryption with MTI Guarantees

  • Conference paper
  • First Online:
Frontiers in Cyber Security (FCS 2023)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 1992))

Included in the following conference series:

  • 299 Accesses

Abstract

Nowadays, users prefer to encrypt their sensitive data before outsourcing it to the cloud. although, performing the encryption assures the data privacy, but it jeopardizes the search functionality. Public key encryption with keyword search (PEKS) is a potential solution for addressing this problem. However, most PEKS schemes are either inefficient, or susceptible to some type of attack(s) (i.e. inside keyword guessing attack, outside keyword guessing attack, ...etc.). Therefore, we propose a sustainable certificateless authenticated encryption system with keyword search scheme. To the best of our knowledge, the proposed scheme considers the multi-trapdoor indistinguishability in the certificateless primitive. Moreover, a thorough security analysis shows that our scheme also guarantees the security against both online and offline keyword guessing attacks. Finally, based on the performance analysis results, we find that the suggested scheme is efficient and outperforms the other schemes.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

Notes

  1. 1.

    If a scheme guarantees the multi-trapdoor indistinguishability (MT-IND), then this implies that the scheme also guarantees trapdoor indistinguishability (TD-IND).

  2. 2.

    We execute each operation 10000 times, collect the timing of each execution, then we calculate the average of the running time.

References

  1. Boneh, D., Di Crescenzo, G., Ostrovsky, R., Persiano, G.: Public key encryption with keyword search. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 506–522. Springer, Heidelberg (2004). https://doi.org/10.1007/978-3-540-24676-3_30

    Chapter  Google Scholar 

  2. Baek, J., Safavi-Naini, R., Susilo, W.: Public key encryption with keyword search revisited. In: Gervasi, O., Murgante, B., Laganà, A., Taniar, D., Mun, Y., Gavrilova, M.L. (eds.) ICCSA 2008. LNCS, vol. 5072, pp. 1249–1259. Springer, Heidelberg (2008). https://doi.org/10.1007/978-3-540-69839-5_96

    Chapter  Google Scholar 

  3. Byun, J.W., Rhee, H.S., Park, H.-A., Lee, D.H.: Off-line keyword guessing attacks on recent keyword search schemes over encrypted data. In: Jonker, W., Petković, M. (eds.) SDM 2006. LNCS, vol. 4165, pp. 75–83. Springer, Heidelberg (2006). https://doi.org/10.1007/11844662_6

    Chapter  Google Scholar 

  4. Rhee, H.S., Park, J.H., Susilo, W., Lee, D.H.: Trapdoor security in a searchable public-key encryption scheme with a designated tester. J. Syst. Softw. 83, 763–771 (2010). https://doi.org/10.1016/J.JSS.2009.11.726

  5. Ma, S., Huang, Q., Zhang, M., Yang, B.: Efficient public key encryption with equality test supporting flexible authorization. IEEE Trans. Inf. Forensics Secur. 10, 458–470 (2015). https://doi.org/10.1109/TIFS.2014.2378592

  6. Fang, L., Susilo, W., Ge, C., Wang, J.: Public key encryption with keyword search secure against keyword guessing attacks without random oracle. Inf. Sci. 238, 221–241 (2013). https://doi.org/10.1016/J.INS.2013.03.008

  7. Peng, Y., Cui, J., Peng, C., Ying, Z.: Certificateless public key encryption with keyword search. China Commun. 11, 100–113 (2014). https://doi.org/10.1109/CC.2014.7004528

  8. Wu, T.Y., Meng, F., Chen, C.M., Liu, S., Pan, J.S.: On the security of a certificateless searchable public key encryption scheme. Adv. Intell. Syst. Comput. 536, 113–119 (2016). https://doi.org/10.1007/978-3-319-48490-7_14

  9. Senouci, M.R., Benkhaddra, I., Senouci, A., Li, F.: An efficient and secure certificateless searchable encryption scheme against keyword guessing attacks. J. Syst. Archit. 119, 102271 (2021). https://doi.org/10.1016/J.SYSARC.2021.102271

  10. Huang, Q., Li, H.: An efficient public-key searchable encryption scheme secure against inside keyword guessing attacks. Inf. Sci. 403–404, 1–14 (2017). https://doi.org/10.1016/J.INS.2017.03.038

  11. Wu, L., Zhang, Y., Ma, M., Kumar, N., He, D.: Certificateless searchable public key authenticated encryption with designated tester for cloud-assisted medical internet of things. Annales des Telecommunications/Ann. Telecommun. 74, 423–434 (2019). https://doi.org/10.1007/S12243-018-00701-7

  12. He, D., Ma, M., Zeadally, S., Kumar, N., Liang, K.: Certificateless public key authenticated encryption with keyword search for industrial internet of things. IEEE Trans. Ind. Inform. 14, 3618–3627 (2018). https://doi.org/10.1109/TII.2017.2771382

  13. Zhang, Y.L., Wen, L., Zhang, Y.J., Wang, C.F.: Deniably authenticated searchable encryption scheme based on blockchain for medical image data sharing. Multimed. Tools Appl. 79, 27075–27090 (2020). https://doi.org/10.1007/S11042-020-09213-W

  14. Ma, M., He, D., Khan, M.K., Chen, J. Certificateless searchable public key encryption scheme for mobile healthcare system. Comput. Electr. Eng. 65, 413–424 (2018). https://doi.org/10.1016/J.COMPELECENG.2017.05.014

  15. Wu, B., Wang, C., Yao, H.: Security analysis and secure channel-free certificateless searchable public key authenticated encryption for a cloud-based internet of things. PLOS ONE 15, e0230722 (2020). https://doi.org/10.1371/JOURNAL.PONE.0230722

  16. Qin, B., Chen, Y., Huang, Q., Liu, X., Zheng, D.: Public-key authenticated encryption with keyword search revisited: Security model and constructions. Inf. Sci. 516, 515–528 (2020). https://doi.org/10.1016/J.INS.2019.12.063

  17. Yang, G., Guo, J., Han, L., Liu, X., Tian, C.: An improved secure certificateless public-key searchable encryption scheme with multi-trapdoor privacy. Peer-to-Peer Network. Appl. 15, 503–515 (2022). https://doi.org/10.1007/S12083-021-01253-9

  18. Senouci, M.R., Benkhaddra, I., Senouci, A., Li, F.: A provably secure free-pairing certificateless searchable encryption scheme. Telecommun. Syst. (2022). https://doi.org/10.1007/s11235-022-00912-3

  19. Al-Riyami, S.S., Paterson, K.G.: Certificateless public key cryptography. In: Laih, C.-S. (ed.) ASIACRYPT 2003. LNCS, vol. 2894, pp. 452–473. Springer, Heidelberg (2003). https://doi.org/10.1007/978-3-540-40061-5_29

    Chapter  Google Scholar 

  20. PBC library - pairing-based cryptography. https://crypto.stanford.edu/pbc/

  21. Keylength - NIST report on cryptographic key length and cryptoperiod (2020). https://www.keylength.com/en/4/

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Mohammed Raouf Senouci .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2024 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Senouci, M.R., Senouci, A., Li, F. (2024). A Pairing-Based Certificateless Authenticated Searchable Encryption with MTI Guarantees. In: Yang, H., Lu, R. (eds) Frontiers in Cyber Security. FCS 2023. Communications in Computer and Information Science, vol 1992. Springer, Singapore. https://doi.org/10.1007/978-981-99-9331-4_29

Download citation

  • DOI: https://doi.org/10.1007/978-981-99-9331-4_29

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-99-9330-7

  • Online ISBN: 978-981-99-9331-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics