Skip to main content
Log in

Quantum-secure plaintext checkable signcryption

  • Research
  • Published:
Iran Journal of Computer Science Aims and scope Submit manuscript

Abstract

A public plaintext query on a ciphertext using plaintext checkable encryption is a cryptographic primitive studied extensively to promote the search on ciphertext using a plaintext keywords or phrase. Most existing schemes are vulnerable to an adversary with quantum computers. In this paper, we propose quantum-secure plaintext checkable signcryption in a lattice environment. Our scheme is post-quantum secure and achieves the dual benefits of digital signature and public key encryption. Learning with errors cryptographic primitive ensures the attainment of this goal. We achieve a desirable security feature of existential unforgeable chosen message attack using the random oracle model.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Alornyo, S., Mensah, A.E., Abbam, A.O.: Identity-based public key cryptographic primitive with delegated equality test against insider attack in cloud computing. Int. J. Netw. Secur. 22(5), 743–751 (2020)

    Google Scholar 

  2. Wu, T., Ma, S., Mu, Y., and Zeng, S.: ID-based encryption with equality test against insider attack. In: Australasian Conference on Information Security and Privacy (pp. 168–183). Springer, Cham (2017)

  3. Lee, H.T., Wang, H., Zhang, K.: Security analysis and modification of ID-based encryption with equality test from ACISP 2017. In: Australasian Conference on Information Security and Privacy (pp. 780–786). Springer, Cham (2018)

  4. Byun, J.W., Rhee, H.S., Park, H.A., Lee, D.H.: Off-line keyword guessing attacks on recent keyword search scheme over encrypted data. In Workshop on Secure Data Management (pp. 75–83). Springer, Berlin, Heidelberg (2006)

  5. Yau, W.C., Heng, S.H., Goi, B.M.: Off-line keyword guessing attacks on recent public key encryption with keyword search schemes. In: International Conference on Autonomic and Trusted Computing (pp. 100–105). Springer, Berlin, Heidelberg (2008)

  6. Boneh, D., Crescenzo, G.D., Ostrovsky, R., Persiano, G.: Public key encryption with keyword search. In: International Conference on the Theory and Applications of Cryptographic Techniques (pp. 506–522). Springer, Berlin, Heidelberg (2004)

  7. Yang, G., Tan, C.H., Huang, Q., Wong, D.S.: Probabilistic public key encryption with equality test. In: Cryptographers’ Track at the RSA Conference (pp. 119–131). Springer, Berlin, Heidelberg (2010)

  8. Lee, H.T., Ling, S., Seo, J.H., Wang, H., Youn, T.Y.: Public key encryption with equality test in the standard model. Inform. Sci. 516, 89–108 (2020)

    Article  MathSciNet  MATH  Google Scholar 

  9. Zhang, K., Chen, J., Lee, H.T., Qian, H., Wang, H.: Efficient public key encryption with equality test in the standard model. Theor. Comput. Sci. 755, 65–80 (2019)

    Article  MathSciNet  MATH  Google Scholar 

  10. Abdalla, M., Bellare, M., Catalano, D., Kiltz, E., Kohno, T., Lange, T., Shi, H.: Searchable encryption revisited: consistency properties, relation to anonymous IBE, and extensions. J. Cryptol. 21(3), 350–391 (2008)

    Article  MathSciNet  MATH  Google Scholar 

  11. Dai, H., Ji, Y., Yang, G., Huang, H., Yi, X.: A privacy-preserving multi-keyword ranked search over encrypted data in hybrid clouds. IEEE Access 8, 4895–4907 (2019)

    Article  Google Scholar 

  12. Chen, R., Mu, Y., Yang, G., Guo, F., Wang, X.: A new general framework for secure public key encryption with keyword search. In: Australasian Conference on Information Security and Privacy (pp. 59–76). Springer, Cham (2015)

  13. Mao, Y., Fu, X., Guo, C., Wu, G.: Public key encryption with conjunctive keyword search secure against keyword guessing attack from lattices. Trans. Emerg. Telecommun. Technol. 30(11), e3531 (2019)

    Google Scholar 

  14. Fuhr, T., Paillier, P.: Decryptable searchable encryption. In: International Conference on Provable Security (pp. 228–36). Springer, Berlin, Heidelberg (2007)

  15. Ibraimi, L., Nikova, S., Hartel, P., Jonker, W.: Public-key encryption with delegated search. In: International Conference on Applied Cryptography and Network Security (pp. 532–549). Springer, Berlin, Heidelberg (2011)

  16. Liu, C., Zhu, L., Wang, M., Tan, Y.A.: Search pattern leakage in searchable encryption: attacks and new construction. Inf. Sci. 265, 176–188 (2014)

    Article  Google Scholar 

  17. Nishioka, M.: Perfect keyword privacy in PEKS systems. In: International Conference on Provable Security (pp. 175–192). Springer, Berlin, Heidelberg (2012)

  18. Sun, W., Lou, W., Hou, Y. T., Li, H.: Privacy-preserving keyword search over encrypted data in cloud computing. In: Secure Cloud Computing (pp. 189–212). Springer, New York (2014)

  19. Orencik, C., Selcuk, A., Savas, E., Kantarcioglu, M.: Multi-keyword search over encrypted data with scoring and search pattern obfuscation. Int. J. Inf. Secur. 15(3), 251–269 (2016)

    Article  Google Scholar 

  20. Rhee, H.S., Susilo, W., Kim, H.J.: Secure searchable public key encryption scheme against keyword guessing attacks. IEICE Electron. Express 6(5), 237–243 (2009)

    Article  Google Scholar 

  21. Xu, P., Jin, H., Wu, Q., Wang, W.: Public-key encryption with fuzzy keyword search: a provably secure scheme under keyword guessing attack. IEEE Trans. Comput. 62(11), 2266–2277 (2012)

    Article  MathSciNet  MATH  Google Scholar 

  22. Wang, B., Yu, S., Lou, W., Hou, Y.T.: Privacy-preserving multi-keyword fuzzy search over encrypted data in the cloud. In: IEEE INFOCOM 2014–IEEE Conference on Computer Communications (pp. 2112–2120). IEEE (2014)

  23. Alornyo, S., Zhao, Y., Zhu, G., Xiong, H.: Identity based key-insulated encryption with outsourced equality test. Int. J. Netw. Secur. 22(2), 257–264 (2020)

    Google Scholar 

  24. Alornyo, S., Mireku, K.K., Mohammed, M.A., Adu-Gyamfi, D., Asante, M.: ID-based key-insulated signcryption with equality test in cloud computing. SN Appl. Sci. 3(4), 1–9 (2021)

    Article  Google Scholar 

  25. Ma, S.: Identity-based encryption with outsourced equality test in cloud computing. Inf. Sci. 328, 389–402 (2016)

    Article  MATH  Google Scholar 

  26. Ma, S., Zhang, M., Huang, Q., Yang, B.: Public key encryption with delegated equality test in a multi-user setting. Comput. J. 58(4), 986–1002 (2015)

    Article  Google Scholar 

  27. Alornyo, S., Mohammed, M.A., Kodzo, B.A.S., Sarpong, P.A., Asante, M.: Parallel key insulated ID-based public key cryptographic primitive with outsourced equality test. J. Comput. Commun. 8(12), 197–213 (2020)

    Article  Google Scholar 

  28. Alornyo, S., Asante, M., Hu, X., Mireku, K. K.: Encrypted traffic analytic using identity based encryption with equality test for cloud computing. In: 2018 IEEE 7th International Conference on Adaptive Science and Technology (ICAST) (pp. 1–4). IEEE (2018)

  29. Canard, S., Fuchsbauer, G., Gouget, A., Laguillaumie, F.: Plaintext-checkable encryption. In: Cryptographers’ Track at the RSA Conference (pp. 332–348). Springer, Berlin, Heidelberg (2012)

  30. Alornyo, S., Mohammed, M.A., Anibrika, B.S., Asante, M.: ID-based plaintext checkable signcryption with equality test in healthcare systems. SN Comput. Sci. 2(1), 1–9 (2021)

    Article  Google Scholar 

  31. Curtmola, R., Garay, J., Kamara, S., Ostrovsky, R.: Searchable symmetric encryption: improved definitions and efficient constructions. J. Comput. Secur. 19(5), 895–934 (2011)

    Article  Google Scholar 

  32. Liu, J.K., Au, M.H., Susilo, W., Liang, K., Lu, R., Srinivasan, B.: Secure sharing and searching for real-time video data in mobile cloud. IEEE Netw. 29(2), 46–50 (2015)

    Article  Google Scholar 

  33. Song, D.X., Wagner, D., Perrig, A.: Practical techniques for searches on encrypted data. In: Proceeding 2000 IEEE Symposium on Security and Privacy 2000 (pp. 44–55). IEEE (2000)

  34. Sun, S.F., Liu, J.K., Sakzad, A., Steinfeld, R., Yuen, T.H.: An efficient non-interactive multi-client searchable encryption with support for Boolean queries. In: European Symposium on Research in Computer Security (pp. 154–172). Springer, Cham (2016)

  35. Yang, X., Lee, T.T., Liu, J.K., Huang, X.: Trust enhancement over range search for encrypted data. In: 2016 IEEE Trustcom/BigDataSE/ISPA (pp. 66–73). IEEE (2016)

  36. Zuo, C., Macindoe, J., Yang, S., Steinfeld, R., Liu, J.K.: Trusted boolean search on cloud using searchable symmetric encryption. In: 2016 IEEE Trustcom/BigDataSE/ISPA (pp. 113–120). IEEE (2016)

  37. Boneh, D., Crescenzo, G.D., Ostrovsky, R., Persiano, G.: Public key encryption with keyword search. In: International Conference on the Theory and Applications of Cryptographic Techniques (pp. 506–522). Springer, Berlin, Heidelberg (2004)

  38. Abdalla, M., Bellare, M., Catalano, D., Kiltz, E., Kohno, T., Lange, T., Shi, H.: Searchable encryption revisited: consistency properties, relation to anonymous IBE, and extensions. J. Cryptol. 21(3), 350–391 (2008)

    Article  MathSciNet  MATH  Google Scholar 

  39. Liang, K., Huang, X., Guo, F., Liu, J.K.: Privacy-preserving and regular language search over encrypted cloud data. IEEE Trans. Inf. Forens. Secur. 11(10), 2365–2376 (2016)

    Article  Google Scholar 

  40. Liang, K., Su, C., Chen, J., Liu, J.K.: Efficient multi-function data sharing and searching mechanism for cloud-based encrypted data. In: Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security (pp. 83–94) (2016)

  41. Tang, Q., Chen, L.: Public-key encryption with registered keyword search. In: European Public Key Infrastructure Workshop (pp. 163–178). Springer, Berlin, Heidelberg (2009)

  42. Han, J., Yang, Y., Huang, X., Yuen, T.H., Li, J., Cao, J.: Accountable mobile E-commerce scheme via identity-based plaintext-checkable encryption. Inf. Sci. 345, 143–155 (2016)

    Article  Google Scholar 

  43. Ma, S., Mu, Y., Susilo, W.: A generic scheme of plaintext-checkable database encryption. Inf. Sci. 429, 88–101 (2018)

    Article  MathSciNet  MATH  Google Scholar 

  44. Alornyo, S., Mohammed, M.A., Anibrika, B.S., Asante, M.: ID-based plaintext checkable signcryption with equality test in healthcare systems. SN Comput. Sci. 2(1), 1–9 (2021)

    Article  Google Scholar 

  45. Li, F., Xiong, H., Liao, Y.: A generic construction of identity-based signcryption. In: 2009 international conference on communications, circuits and systems (pp. 291–295). IEEE (2009)

  46. Li, F., Khan, M.K.: A survey of identity-based signcryption. IETE Tech. Rev. 28(3), 265–272 (2011)

    Article  Google Scholar 

  47. Zheng, Y.: Digital signcryption or how to achieve cost (signature and encryption) cost (signature)+ cost (encryption). In: Annual International Cryptology Conference (pp. 165–179). Springer, Berlin, Heidelberg (1997)

  48. Barbosa, M., Farshim, P.: Certificateless signcryption. In Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security (pp. 369–372) (2008)

  49. Peikert, C.: Public-key cryptosystems from the worst-case shortest vector problem. In: Proceedings of the Forty-First Annual ACM Symposium on Theory of Computing (pp. 333–342) (2009)

  50. Regev, O.: On lattices, learning with errors, random linear codes, and cryptography. J. ACM (JACM) 56(6), 1–40 (2009)

    Article  MathSciNet  MATH  Google Scholar 

  51. Huang, Q., Li, H.: An efficient public-key searchable encryption scheme secure against inside keyword guessing attacks. Inf. Sci. 403, 1–14 (2017)

    Article  MATH  Google Scholar 

  52. Li, H., Huang, Q., Shen, J., et al.: Designated-server identity-based authenticated encryption with keyword search for encrypted emails. Inf. Sci. 481, 330–343 (2019)

    Article  Google Scholar 

  53. He, D., Ma, M., Zeadally, S., et al.: Certificateless public key authenticated encryption with keyword search for industrial internet of things. IEEE Trans. Ind. Inf. 14(8), 3618–3627 (2017)

    Article  Google Scholar 

  54. Zhang, X., Tang, Y., Wang, H., et al.: Lattice-based proxy-oriented identity-based encryption with keyword search for cloud storage. Inf. Sci. 494, 193–207 (2019)

    Article  MathSciNet  MATH  Google Scholar 

  55. Alornyo, S., Aidoo, E., Mireku, K. K., Kwofie, B., Hu, X., Asante, M.: ID-based outsourced plaintext checkable encryption in healthcare database. In: 2019 International conference on cyber security and internet of things (ICSIoT) (pp. 48–53). IEEE (2019)

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Seth Alornyo.

Ethics declarations

Conflict of interest

The author declares that they have no conflict of interest.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Alornyo, S. Quantum-secure plaintext checkable signcryption. Iran J Comput Sci 6, 63–68 (2023). https://doi.org/10.1007/s42044-022-00119-4

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s42044-022-00119-4

Keywords

Navigation