Soft Computing

, Volume 21, Issue 10, pp 2599–2607 | Cite as

Dual trapdoor identity-based encryption with keyword search

Methodologies and Application

Abstract

Identity-based encryption with keyword search (IBEKS) is a useful cryptographic primitive for cloud computing, i.e., it allows a data owner to encrypt and store his data in a cloud storage server, and later the owner can use his/her private key to produce a search trapdoor for searching the encrypted data. Existing IBEKS schemes only focus on supporting efficient and complex queries for the private key holder, while the authority, who is in charge of the generation of the private keys for users, cannot efficiently search the encrypted data. However, some applications might require the authority to efficiently search the encrypted data intended for any user. To address this problem, in this paper, we introduce a new primitive named dual trapdoor identity-based encryption with keyword search (DTIBEKS). In this primitive, the authority can use a peculiar way to produce one more trapdoor, which allows the authority to search any identity’s encrypted data. We formally give the definition and security model for DTIBEKS, and then propose a novel DTIBEKS scheme. We further prove the security of our proposed DTIBEKS without random oracles. It is worth noting that our scheme can be easily transformed into identity-based encryption with fuzzy keyword search.

Keywords

Cloud computing Fuzzy keyword search Identity-based encryption with keyword search Hierarchical identity-based encryption Dual system encryption 

References

  1. Abdalla M, Bellare M, Catalano D, Kiltz E, Kohno T, Lange T, Malone-Lee J, Neven G, Paillier P, Shi H(2005) Searchable encryption revisited: consistency properties, relation to anonymous ibe, and extensions. In: Shoup V (ed) Proceedings of advances in cryptology—CRYPTO 2005: 25th annual international cryptology conference, Santa Barbara, California, USA, August 14–18, 2005. Lecture notes in computer science, vol 3621. Springer, New York, pp 205–222. doi:10.1007/11535218_13
  2. Boneh D, Boyen X, Goh E (2005) Hierarchical identity based encryption with constant size ciphertext. In: Cramer R (ed) Advances in cryptology—EUROCRYPT 2005, Proceedings of 24th annual international conference on the theory and applications of cryptographic techniques, Aarhus, Denmark, May 22–26, 2005. Lecture notes in computer science, vol 3494. Springer, New York, pp 440–456. doi:10.1007/11426639_26
  3. Boneh D, Crescenzo GD, Ostrovsky R, Persiano G (2004) Public key encryption with keyword search. In: Cachin C, Camenisch J (eds) Advances in cryptology—EUROCRYPT 2004, Proceedings of international conference on the theory and applications of cryptographic techniques, Interlaken, Switzerland, May 2–6, 2004. Lecture notes in computer science, vol 3027. Springer, New York, pp 506–522. doi:10.1007/978-3-540-24676-3_30
  4. Boneh D, Franklin MK (2001) Identity-based encryption from the weil pairing. In: Kilian J (ed) Advances in cryptology—CRYPTO 2001, Proceedings of 21st annual international cryptology conference, Santa Barbara, California, USA, August 19–23, 2001. Lecture notes in computer science, vol 2139. Springer, New York, pp 213–229. doi:10.1007/3-540-44647-8_13
  5. Boneh D, Goh E, Nissim K (2005) Evaluating 2-dnf formulas on ciphertexts. In: Kilian J (ed) Proceedings of theory of cryptography, second theory of cryptography conference, TCC 2005, Cambridge, MA, USA, February 10–12, 2005. Lecture notes in computer science, vol 3378. Springer, New York, pp 325–341. doi:10.1007/978-3-540-30576-7_18
  6. Boyen X, Waters B (2006) Anonymous hierarchical identity-based encryption (without random oracles). In: Dwork C (ed) Advances in cryptology—CRYPTO 2006, Proceedings of 26th annual international cryptology conference, Santa Barbara, California, USA, August 20–24, 2006. Lecture notes in computer science, vol 4117. Springer, New York, pp 290–307. doi:10.1007/11818175_17
  7. Camenisch J, Kohlweiss M, Rial A, Sheedy C (2009) Blind and anonymous identity-based encryption and authorised private searches on public key encrypted data. In: Jarecki and Tsudik [15], pp 196–214. doi:10.1007/978-3-642-00468-1_12
  8. Caro AD, Iovino V, Persiano G (2010) Fully secure anonymous HIBE and secret-key anonymous IBE with short ciphertexts. In: Pairing-based cryptography—pairing 2010—Proceedings of 4th international conference, Yamanaka Hot Spring, Japan, December 2010, pp 347–366Google Scholar
  9. Gentry C, Halevi S (2009) Hierarchical identity based encryption with polynomially many levels. In: Reingold [21], pp 437–456. doi:10.1007/978-3-642-00457-5_26
  10. Gentry C, Silverberg A (2002) Hierarchical id-based cryptography. In: Zheng Y (ed) Advances in cryptology—ASIACRYPT 2002, Proceedings of 8th international conference on the theory and application of cryptology and information security, Queenstown, New Zealand, December 1–5, 2002. Lecture notes in computer science, vol 2501. Springer, New York, pp 548–566. doi:10.1007/3-540-36178-2_34
  11. Golle P, Staddon J, Waters BR (2004) Secure conjunctive keyword search over encrypted data. In: Jakobsson M, Yung M, Zhou J (eds) Proceedings of applied cryptography and network security, second international conference, ACNS 2004, Yellow Mountain, China, June 8–11, 2004. Lecture notes in computer science, vol 3089. Springer, New York, pp 31–45. doi:10.1007/978-3-540-24852-1_3
  12. Goyal V, Pandey O, Sahai A, Waters B (2006) Attribute-based encryption for fine-grained access control of encrypted data. In: Juels A, Wright RN, di Vimercati SDC (eds) Proceedings of the 13th ACM conference on computer and communications security, CCS 2006, Alexandria, VA, USA, october 30–November 3, 2006. ACM, pp 89–98. doi:10.1145/1180405.1180418
  13. Horwitz J, Lynn B (2002) Toward hierarchical identity-based encryption. In: Knudsen LR (ed) Proceedings of advances in cryptology—EUROCRYPT 2002, international conference on the theory and applications of cryptographic techniques, Amsterdam, The Netherlands, April 28–May 2, 2002. Lecture notes in computer science, vol 2332. Springer, New York, pp 466–481. doi:10.1007/3-540-46035-7_31
  14. Hwang YH, Lee PJ (2007) Public key encryption with conjunctive keyword search and its extension to a multi-user system. In: Takagi T, Okamoto T, Okamoto E, Okamoto T (eds) Proceedings of pairing-based cryptography—pairing 2007, first international conference, Tokyo, Japan, July 2–4, 2007. Lecture notes in computer science, vol 4575. Springer, New York, pp 2–22. doi:10.1007/978-3-540-73489-5_2
  15. Jarecki S, Tsudik G (eds) Public key cryptography—PKC 2009, Proceedings of 12th international conference on practice and theory in public key cryptography, Irvine, CA, USA, March 18–20, 2009. Lecture notes in computer science, vol 5443. Springer, New York. doi:10.1007/978-3-642-00468-1
  16. Katz J, Sahai A, Waters B (2008) Predicate encryption supporting disjunctions, polynomial equations, and inner products. In: Smart NP (ed) Advances in cryptology—EUROCRYPT 2008, Proceedings of 27th annual international conference on the theory and applications of cryptographic techniques, Istanbul, Turkey, April 13–17, 2008. Lecture notes in computer science, vol 4965. Springer, New York, pp 146–162. doi:10.1007/978-3-540-78967-3_9
  17. Lai J, Zhou X, Deng RH, Li Y, Chen K (2013) Expressive search on encrypted data. In: Chen K, Xie Q, Qiu W, Li N, Tzeng W (eds) 8th ACM symposium on information, computer and communications security, ASIA CCS ’13, Hangzhou, China, May 08–10, 2013. ACM, pp 243–252. doi:10.1145/2484313.2484345
  18. Lewko AB, Waters B (2010) New techniques for dual system encryption and fully secure HIBE with short ciphertexts. In: Micciancio D (ed) Proceedings of 7th theory of cryptography conference, TCC 2010, Zurich, Switzerland, February 9–11, 2010. Lecture notes in computer science, vol 5978. Springer, New York, pp 455–479. doi:10.1007/978-3-642-11799-2_27
  19. Li J, Wang Q, Wang C, Cao N, Ren K, Lou W (2010) Fuzzy keyword search over encrypted data in cloud computing. In: 29th IEEE international conference on computer communications, joint conference of the IEEE computer and communications societies, 15–19 March 2010, San Diego, CA, USA. IEEE, pp 441–445. doi:10.1109/INFCOM.2010.5462196
  20. Park DJ, Kim K, Lee PJ (2004) Public key encryption with conjunctive field keyword search. In: Lim CH, Yung M (eds) Information security applications, 5th international workshop, WISA 2004, Jeju Island, Korea, August 23–25, 2004, revised selected papers. Lecture notes in computer science, vol 3325. Springer, New York, pp 73–86. doi:10.1007/978-3-540-31815-6_7
  21. Reingold O (ed) (2009) Proceedings of 6th theory of cryptography conference, TCC 2009, San Francisco, CA, USA, March 15–17, 2009. Lecture notes in computer science, vol 5444. Springer, New York. doi:10.1007/978-3-642-00457-5
  22. Seo JH, Kobayashi T, Ohkubo M, Suzuki K (2009) Anonymous hierarchical identity-based encryption with constant size ciphertexts. In: Jarecki and Tsudik [15], pp 215–234. doi:10.1007/978-3-642-00468-1_13
  23. Shamir A (1984) Identity-based cryptosystems and signature schemes. In: Blakley GR, Chaum D (eds) Advances in cryptology, proceedings of CRYPTO ’84, Santa Barbara, California, USA, August 19–22, 1984. Lecture notes in computer science, vol 196. Springer, New York, pp 47–53. doi:10.1007/3-540-39568-7_5
  24. Shen E, Shi E, Waters B (2015) Predicate privacy in encryption systems. In: Reingold [21], pp 457–473. doi:10.1007/978-3-642-00457-5_27
  25. Waters B (2009) Dual system encryption: realizing fully secure IBE and HIBE under simple assumptions. In: Halevi S (ed) Advances in cryptology—CRYPTO 2009, Proceedings of 29th annual international cryptology conference, Santa Barbara, CA, USA, August 16–20, 2009. Lecture notes in computer science, vol 5677. Springer, New York, pp 619–636. doi:10.1007/978-3-642-03356-8_36
  26. Zhang B, Zhang F (2011) An efficient public key encryption with conjunctive-subset keywords search. J Netw Computer Appl 34(1):262–267CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2015

Authors and Affiliations

  1. 1.College of Information Science and TechnologyJinan UniversityGuangdongChina
  2. 2.Fujian Provincial Key Laboratory of Network Security and Cryptology, School of Mathematics and Computer ScienceFujian Normal UniversityFuzhouChina
  3. 3.Nanjing University of Information Science and TechnologyNanjingChina

Personalised recommendations