Abstract
A public plaintext query on a ciphertext using plaintext checkable encryption is a cryptographic primitive studied extensively to promote the search on ciphertext using a plaintext keywords or phrase. Most existing schemes are vulnerable to an adversary with quantum computers. In this paper, we propose quantum-secure plaintext checkable signcryption in a lattice environment. Our scheme is post-quantum secure and achieves the dual benefits of digital signature and public key encryption. Learning with errors cryptographic primitive ensures the attainment of this goal. We achieve a desirable security feature of existential unforgeable chosen message attack using the random oracle model.
Similar content being viewed by others
References
Alornyo, S., Mensah, A.E., Abbam, A.O.: Identity-based public key cryptographic primitive with delegated equality test against insider attack in cloud computing. Int. J. Netw. Secur. 22(5), 743–751 (2020)
Wu, T., Ma, S., Mu, Y., and Zeng, S.: ID-based encryption with equality test against insider attack. In: Australasian Conference on Information Security and Privacy (pp. 168–183). Springer, Cham (2017)
Lee, H.T., Wang, H., Zhang, K.: Security analysis and modification of ID-based encryption with equality test from ACISP 2017. In: Australasian Conference on Information Security and Privacy (pp. 780–786). Springer, Cham (2018)
Byun, J.W., Rhee, H.S., Park, H.A., Lee, D.H.: Off-line keyword guessing attacks on recent keyword search scheme over encrypted data. In Workshop on Secure Data Management (pp. 75–83). Springer, Berlin, Heidelberg (2006)
Yau, W.C., Heng, S.H., Goi, B.M.: Off-line keyword guessing attacks on recent public key encryption with keyword search schemes. In: International Conference on Autonomic and Trusted Computing (pp. 100–105). Springer, Berlin, Heidelberg (2008)
Boneh, D., Crescenzo, G.D., Ostrovsky, R., Persiano, G.: Public key encryption with keyword search. In: International Conference on the Theory and Applications of Cryptographic Techniques (pp. 506–522). Springer, Berlin, Heidelberg (2004)
Yang, G., Tan, C.H., Huang, Q., Wong, D.S.: Probabilistic public key encryption with equality test. In: Cryptographers’ Track at the RSA Conference (pp. 119–131). Springer, Berlin, Heidelberg (2010)
Lee, H.T., Ling, S., Seo, J.H., Wang, H., Youn, T.Y.: Public key encryption with equality test in the standard model. Inform. Sci. 516, 89–108 (2020)
Zhang, K., Chen, J., Lee, H.T., Qian, H., Wang, H.: Efficient public key encryption with equality test in the standard model. Theor. Comput. Sci. 755, 65–80 (2019)
Abdalla, M., Bellare, M., Catalano, D., Kiltz, E., Kohno, T., Lange, T., Shi, H.: Searchable encryption revisited: consistency properties, relation to anonymous IBE, and extensions. J. Cryptol. 21(3), 350–391 (2008)
Dai, H., Ji, Y., Yang, G., Huang, H., Yi, X.: A privacy-preserving multi-keyword ranked search over encrypted data in hybrid clouds. IEEE Access 8, 4895–4907 (2019)
Chen, R., Mu, Y., Yang, G., Guo, F., Wang, X.: A new general framework for secure public key encryption with keyword search. In: Australasian Conference on Information Security and Privacy (pp. 59–76). Springer, Cham (2015)
Mao, Y., Fu, X., Guo, C., Wu, G.: Public key encryption with conjunctive keyword search secure against keyword guessing attack from lattices. Trans. Emerg. Telecommun. Technol. 30(11), e3531 (2019)
Fuhr, T., Paillier, P.: Decryptable searchable encryption. In: International Conference on Provable Security (pp. 228–36). Springer, Berlin, Heidelberg (2007)
Ibraimi, L., Nikova, S., Hartel, P., Jonker, W.: Public-key encryption with delegated search. In: International Conference on Applied Cryptography and Network Security (pp. 532–549). Springer, Berlin, Heidelberg (2011)
Liu, C., Zhu, L., Wang, M., Tan, Y.A.: Search pattern leakage in searchable encryption: attacks and new construction. Inf. Sci. 265, 176–188 (2014)
Nishioka, M.: Perfect keyword privacy in PEKS systems. In: International Conference on Provable Security (pp. 175–192). Springer, Berlin, Heidelberg (2012)
Sun, W., Lou, W., Hou, Y. T., Li, H.: Privacy-preserving keyword search over encrypted data in cloud computing. In: Secure Cloud Computing (pp. 189–212). Springer, New York (2014)
Orencik, C., Selcuk, A., Savas, E., Kantarcioglu, M.: Multi-keyword search over encrypted data with scoring and search pattern obfuscation. Int. J. Inf. Secur. 15(3), 251–269 (2016)
Rhee, H.S., Susilo, W., Kim, H.J.: Secure searchable public key encryption scheme against keyword guessing attacks. IEICE Electron. Express 6(5), 237–243 (2009)
Xu, P., Jin, H., Wu, Q., Wang, W.: Public-key encryption with fuzzy keyword search: a provably secure scheme under keyword guessing attack. IEEE Trans. Comput. 62(11), 2266–2277 (2012)
Wang, B., Yu, S., Lou, W., Hou, Y.T.: Privacy-preserving multi-keyword fuzzy search over encrypted data in the cloud. In: IEEE INFOCOM 2014–IEEE Conference on Computer Communications (pp. 2112–2120). IEEE (2014)
Alornyo, S., Zhao, Y., Zhu, G., Xiong, H.: Identity based key-insulated encryption with outsourced equality test. Int. J. Netw. Secur. 22(2), 257–264 (2020)
Alornyo, S., Mireku, K.K., Mohammed, M.A., Adu-Gyamfi, D., Asante, M.: ID-based key-insulated signcryption with equality test in cloud computing. SN Appl. Sci. 3(4), 1–9 (2021)
Ma, S.: Identity-based encryption with outsourced equality test in cloud computing. Inf. Sci. 328, 389–402 (2016)
Ma, S., Zhang, M., Huang, Q., Yang, B.: Public key encryption with delegated equality test in a multi-user setting. Comput. J. 58(4), 986–1002 (2015)
Alornyo, S., Mohammed, M.A., Kodzo, B.A.S., Sarpong, P.A., Asante, M.: Parallel key insulated ID-based public key cryptographic primitive with outsourced equality test. J. Comput. Commun. 8(12), 197–213 (2020)
Alornyo, S., Asante, M., Hu, X., Mireku, K. K.: Encrypted traffic analytic using identity based encryption with equality test for cloud computing. In: 2018 IEEE 7th International Conference on Adaptive Science and Technology (ICAST) (pp. 1–4). IEEE (2018)
Canard, S., Fuchsbauer, G., Gouget, A., Laguillaumie, F.: Plaintext-checkable encryption. In: Cryptographers’ Track at the RSA Conference (pp. 332–348). Springer, Berlin, Heidelberg (2012)
Alornyo, S., Mohammed, M.A., Anibrika, B.S., Asante, M.: ID-based plaintext checkable signcryption with equality test in healthcare systems. SN Comput. Sci. 2(1), 1–9 (2021)
Curtmola, R., Garay, J., Kamara, S., Ostrovsky, R.: Searchable symmetric encryption: improved definitions and efficient constructions. J. Comput. Secur. 19(5), 895–934 (2011)
Liu, J.K., Au, M.H., Susilo, W., Liang, K., Lu, R., Srinivasan, B.: Secure sharing and searching for real-time video data in mobile cloud. IEEE Netw. 29(2), 46–50 (2015)
Song, D.X., Wagner, D., Perrig, A.: Practical techniques for searches on encrypted data. In: Proceeding 2000 IEEE Symposium on Security and Privacy 2000 (pp. 44–55). IEEE (2000)
Sun, S.F., Liu, J.K., Sakzad, A., Steinfeld, R., Yuen, T.H.: An efficient non-interactive multi-client searchable encryption with support for Boolean queries. In: European Symposium on Research in Computer Security (pp. 154–172). Springer, Cham (2016)
Yang, X., Lee, T.T., Liu, J.K., Huang, X.: Trust enhancement over range search for encrypted data. In: 2016 IEEE Trustcom/BigDataSE/ISPA (pp. 66–73). IEEE (2016)
Zuo, C., Macindoe, J., Yang, S., Steinfeld, R., Liu, J.K.: Trusted boolean search on cloud using searchable symmetric encryption. In: 2016 IEEE Trustcom/BigDataSE/ISPA (pp. 113–120). IEEE (2016)
Boneh, D., Crescenzo, G.D., Ostrovsky, R., Persiano, G.: Public key encryption with keyword search. In: International Conference on the Theory and Applications of Cryptographic Techniques (pp. 506–522). Springer, Berlin, Heidelberg (2004)
Abdalla, M., Bellare, M., Catalano, D., Kiltz, E., Kohno, T., Lange, T., Shi, H.: Searchable encryption revisited: consistency properties, relation to anonymous IBE, and extensions. J. Cryptol. 21(3), 350–391 (2008)
Liang, K., Huang, X., Guo, F., Liu, J.K.: Privacy-preserving and regular language search over encrypted cloud data. IEEE Trans. Inf. Forens. Secur. 11(10), 2365–2376 (2016)
Liang, K., Su, C., Chen, J., Liu, J.K.: Efficient multi-function data sharing and searching mechanism for cloud-based encrypted data. In: Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security (pp. 83–94) (2016)
Tang, Q., Chen, L.: Public-key encryption with registered keyword search. In: European Public Key Infrastructure Workshop (pp. 163–178). Springer, Berlin, Heidelberg (2009)
Han, J., Yang, Y., Huang, X., Yuen, T.H., Li, J., Cao, J.: Accountable mobile E-commerce scheme via identity-based plaintext-checkable encryption. Inf. Sci. 345, 143–155 (2016)
Ma, S., Mu, Y., Susilo, W.: A generic scheme of plaintext-checkable database encryption. Inf. Sci. 429, 88–101 (2018)
Alornyo, S., Mohammed, M.A., Anibrika, B.S., Asante, M.: ID-based plaintext checkable signcryption with equality test in healthcare systems. SN Comput. Sci. 2(1), 1–9 (2021)
Li, F., Xiong, H., Liao, Y.: A generic construction of identity-based signcryption. In: 2009 international conference on communications, circuits and systems (pp. 291–295). IEEE (2009)
Li, F., Khan, M.K.: A survey of identity-based signcryption. IETE Tech. Rev. 28(3), 265–272 (2011)
Zheng, Y.: Digital signcryption or how to achieve cost (signature and encryption) cost (signature)+ cost (encryption). In: Annual International Cryptology Conference (pp. 165–179). Springer, Berlin, Heidelberg (1997)
Barbosa, M., Farshim, P.: Certificateless signcryption. In Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security (pp. 369–372) (2008)
Peikert, C.: Public-key cryptosystems from the worst-case shortest vector problem. In: Proceedings of the Forty-First Annual ACM Symposium on Theory of Computing (pp. 333–342) (2009)
Regev, O.: On lattices, learning with errors, random linear codes, and cryptography. J. ACM (JACM) 56(6), 1–40 (2009)
Huang, Q., Li, H.: An efficient public-key searchable encryption scheme secure against inside keyword guessing attacks. Inf. Sci. 403, 1–14 (2017)
Li, H., Huang, Q., Shen, J., et al.: Designated-server identity-based authenticated encryption with keyword search for encrypted emails. Inf. Sci. 481, 330–343 (2019)
He, D., Ma, M., Zeadally, S., et al.: Certificateless public key authenticated encryption with keyword search for industrial internet of things. IEEE Trans. Ind. Inf. 14(8), 3618–3627 (2017)
Zhang, X., Tang, Y., Wang, H., et al.: Lattice-based proxy-oriented identity-based encryption with keyword search for cloud storage. Inf. Sci. 494, 193–207 (2019)
Alornyo, S., Aidoo, E., Mireku, K. K., Kwofie, B., Hu, X., Asante, M.: ID-based outsourced plaintext checkable encryption in healthcare database. In: 2019 International conference on cyber security and internet of things (ICSIoT) (pp. 48–53). IEEE (2019)
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interest
The author declares that they have no conflict of interest.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Alornyo, S. Quantum-secure plaintext checkable signcryption. Iran J Comput Sci 6, 63–68 (2023). https://doi.org/10.1007/s42044-022-00119-4
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s42044-022-00119-4