Computers, Materials & Continua DOI:10.32604/cmc.2022.028562 | |
Article |
A Searchable Encryption Scheme Based on Lattice for Log Systems in Blockchain
1School of Information Science and Technology, North China University of Technology, Beijing, 100144, China
2School of Information Engineering, Inner Mongolia University of Science and Technology, Baotou, 014010, China
3Information Security Center, State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, 100876, China
4School of Electronic Engineering, Dublin City University, Dublin, Ireland
*Corresponding Author: Xin Liu. Email: lx2001.lx@163.com
Received: 12 February 2022; Accepted: 14 March 2022
Abstract: With the increasing popularity of cloud storage, data security on the cloud has become increasingly visible. Searchable encryption has the ability to realize the privacy protection and security of data in the cloud. However, with the continuous development of quantum computing, the standard Public-key Encryption with Keyword Search (PEKS) scheme cannot resist quantum-based keyword guessing attacks. Further, the credibility of the server also poses a significant threat to the security of the retrieval process. This paper proposes a searchable encryption scheme based on lattice cryptography using blockchain to address the above problems. Firstly, we design a lattice-based encryption primitive to resist quantum keyword guessing attacks. Moreover, blockchain is to decentralize the cloud storage platform’s jurisdiction of data. It also ensures that the traceability of keyword retrieval process and maintains the credibility of search result, which malicious platforms are prevented as much as possible from deliberately sending wrong search results. Last but not least, through security analysis, our proposed scheme satisfies the credibility and unforgeability of the keyword ciphertext. The comprehensive performance evaluates that our scheme has certain advantages in terms of efficiency compared with others.
Keywords: Lattice cryptography; searchable encryption; blockchain; privacy protection; log system; information security; applied cryptography
With the advancement of the big data period, more and more log files containing private data are being stored by data owners in the cloud, facing significant privacy threats and challenges. Searchable encryption is a technology for searching the log ciphertext based on keyword trapdoors. In this technology, data users can obtain the search trapdoors based on the searching keywords provided to the servicer. Then, the servicer executes a search algorithm to search for the matching ciphertext to correctly retrieve the data required by the user without recovering the plaintext, which significantly protects data privacy. At the beginning of the 21st century, Song et al. [1] put forward the new academic concept of searchable encryption for the first time. They completed the first research plan for the search problem of encrypted data. Further, searchable encryption can be divided into two categories, whether the encryption key and the decryption key are the same. The encryption key and decryption key of symmetric searchable encryption are the same, which cannot guarantee data security. Generally, it is only used when the owner and user of the log file are the same people, and it fails to satisfy most applications.
In 2004, Boneh et al. [2] focused on searching for specific encrypted mailboxes to define the concept of Public-key Encryption with Keyword Search (PEKS) and gave a specific implementation. PEKS has different encryption and decryption keys, which can achieve the effect of sharing data information between data owners and data users so that searchable encryption can be applied to more practical scenarios. Many researchers have since improved and optimised the PEKS scheme to achieve faster search efficiency. Xu et al. [3] proposed Searchable Public Key Ciphertext with Hidden Structure (SPCHS), enabling the fastest possible search of keywords without compromising the encrypted keywords' contextual security. Cui et al. [4] proposed the concept of key aggregation searchable encryption and adopted the Key-Aggregate Searchable Encryption (KASE) scheme. In this scheme, the data owner is only required to issue a public key to the data users who share many files, which is helpful for the effective management of the key and makes this scheme easier to use in practical situations. Song et al. [5] proposed two searchable encryption schemes, FAST and FASTIO, to achieve forward privacy, dramatically improving I/O efficiency and reducing communication overhead.
However, traditional PEKS faces the problem of the untrustworthiness of the servicer, which is fortunately solved to a certain extent by the emergence of blockchain technology. Blockchain, proposed by Nakamoto [6] in 2008, is a distributed public ledger that records all transactions into the block without third-party control and ensures the security and fairness of each transaction. At present, the vigorous development of blockchain technology is favoured by many researchers [7–16]. Wang et al. [17] proposed a scheme that uses blockchain technology to store the hash value of users' private data and the attribute set of third-party applications, which realises secure one-to-many transmission of personal data. Xu et al. [18] avoided the intervention of third-party agencies through blockchain technology and established a multi-party security system. However, blockchain can solve the problem of the untrustworthiness of third-party organisations. Based on this idea, Li et al. [19] proposed a searchable encryption scheme (SSE-using-BC) based on blockchain technology, storing encrypted data on a decentralised blockchain. It avoids the intervention of centralised service providers and ensures the privacy of encrypted data. In 2019, Chen et al. [20] proposed a searchable encryption scheme for Electronic Health Records (EHR). Researchers used logical expressions to generate an EHR index and store it in the blockchain to ensure the EHR index’s immutability, integrity, and traceability. In 2020, Nie et al. [21] used searchable encryption to safeguard the privacy of data information and applied the Ethereum blockchain to solve the fairness problem in the search process. Chen et al. [22] designed a new Blockchain-based Searchable Public-key Encryption Scheme with Forward and Backward Privacy (BSPEFB), which largely avoids the adaptive leakage-exploiting attacks of searchable encryption technology in the Vehicle Social Network (VSN) and reflects the practicality of the scheme.
Although the above scheme has improved the problem of the untrustworthiness of the service party in the searchable encryption process, with the rapid development of quantum computing [23], the Shor algorithm realises the rapid decomposition of large prime factors [24]. As a result, malicious users with a quantum computer can launch a keyword guessing attack based on quantum computing, causing searchable encryption schemes based on traditional cryptography to lose security and privacy. As a result, more researchers have devoted themselves to proposing a post-quantum method. Nabil et al. [25] proposed that the traditional blockchain scheme is vulnerable to attacks by quantum adversaries. It designed the first post-quantum security signature scheme with public key re-randomisation by providing a deterministic wallet scheme with a post-quantum structure. However, lattice-based cryptography has the highest efficiency and low communication overhead among many post-quantum schemes, and is thus the most promising technology.
In a nutshell, we propose a searchable encryption scheme based on lattice for log systems in the blockchain. Then, we describe our main contributions as follows:
1. Firstly, we propose a searchable encryption scheme based on lattice cryptography to resist keyword guessing attacks under quantum computing.
2. Secondly, blockchain technology is applied to replace the authoritative and trusted party in the scheme to ensure the honesty and credibility of the server.
3. Finally, we conduct a security analysis of our scheme and compare it with other schemes, demonstrating its feasibility and efficiency.
Definition 1 (Lattice) Suppose that
Definition 2 (Dual Lattice) Suppose that
Definition 3 (q-ary Lattice) Set
Obviously,
Definition 4 (Discrete Gaussian Distribution) Suppose that
Lemma 1 (TrapGen) [26] Suppose
Lemma 2 (SamplePre) [27] Set
Lemma 3 (SampleL) [28] Suppose a positive integer
Lemma 4 (SampleR) [28] Suppose a positive integer
Lemma 5 (Gaussian Sampling) [27] Knowing the centre
Definition 5 (ISIS problem) Suppose it is an integer
3.1 Blockchain Architecture and Transaction Design
The structure of the blockchain and transaction constructed in this paper is shown in Fig. 1. The keyword ciphertext attribute and number attribute are added to the transaction. The keyword ciphertext attribute is formed by the data owner encrypting the keyword with the data user’s public key, and the number attribute records the number corresponding to the keyword. Based on this, the smart contract traverses the ciphertext of each keyword according to the search trapdoor uploaded by the data user and returns the number corresponding to the qualified keyword to the cloud storage platform. In this way, data owners and data users can share data.
The architecture of our scheme shows in Fig. 2. The roles participating in this scheme include data owner, cloud storage platform, blockchain network, and data user. Their roles in the system are as follows:
(1) Data owner. A data owner is the owner of the log file. He/she divides the log file, generates a number set, and extracts a valid keyword set to store the encrypted log file information in the cloud storage platform. In addition, he/she calculates the keyword ciphertext set corresponding to the log and then uploads the data index to the blockchain. The main problem faced by our scheme is that malicious users perform keyword guessing attacks under quantum computing on the keyword ciphertext, so our scheme focuses on the description of the encryption process of keywords.
(2) Cloud storage platform. Cloud storage platform receives and stores the encrypted log file uploaded by the data owner. After getting the permission of the smart contract, the cloud storage platform returns the specific log file ciphertext to the data user.
(3) Blockchain network. By designing the algorithm in the smart contract, it receives the keyword ciphertext uploaded by the data owner and the trapdoor transmitted by the data user. After receiving a query request from a user, the query is performed according to a specific algorithm, and then the query result is returned to the cloud storage platform. The cloud storage platform is notified whether to send the ciphertext of the log file to the data user.
(4) Data user. A data user is responsible for making a query request to the smart contract. Thus, he/she gets the ciphertext of the corresponding logfile from the cloud storage platform and obtains the plaintext of the log file after decryption.
3.3 Related Algorithm Definition
Definition 6 The searchable encryption scheme based on lattice includes:
(1)
(2)
(3)
(4)
4 Detailed Description of Our Scheme
Initialise algorithm includes system initialisation, key initialisation, and blockchain network initialisation. In this algorithm, the system sets a series of parameters required for execution and distributes keys to the main participants of the system. The specific process
(1) System initialisation. A series of system parameters
(2) Key initialisation. The system inputs the parameter p, Lemma 1 outputs the matrix
(3) Blockchain network initialisation. The data owner initialises the single search cost
4.2 Encrypt (F, pkown, skown, pkre)
Encrypt algorithm includes log file encryption and keyword encryption. At this stage, this paper mainly studies the process of keyword encryption. The specific steps
(1) Preparation stage. The data owner will divide the log file
(2) Log file encryption. The data owner uses the public key
(3) Keyword encryption. The data owner randomly samples a vector
(4) Keyword ciphertext uploading. The data owner uses the private key to generate a digital signature for the hash value
The data user inputs their public key
Before running
The cloud storage platform finds the ciphertext of the corresponding log file according to the index value and transmits it to the data user. To obtain the plaintext of the log file, the data user decrypts the ciphertext.
Proof: For the method of restoring the value during the search and verification process, we give the proof as follow:
Among this process,
This solution is based on the blockchain network, which can ensure the honesty and credibility of search results and primarily resist malicious attacks by illegal users on the server. The keyword search process does not involve any third parties in the decentralised blockchain network, and the nodes conduct open and transparent interactions based on transactions. All transactions and operations are recorded on the block. The characteristics of traceability and non-tampering can ensure the fairness and credibility of each search operation. In addition, each transaction initiated in the blockchain network requires the payment of a particular cost, which effectively avoids the possibility of illegal users undermining the program's regular operation through malicious and exhaustive means.
5.2 Unforgeability of Keyword Ciphertext
In this scheme, the keyword ciphertext of the log file is unforgeable, its security can be reduced to ISIS hardness, and it effectively resists keyword guessing attacks initiated by illegal users equipped with quantum computers, thereby ensuring privacy of the plaintext.
Theorem 1 For any adversary A in polynomial time, the difficulty of forging the ciphertext of a keyword is equal to the difficulty of solving the difficult problem of ISIS currently.
Proof: Assuming that adversary A cracks the unforgeability of the ciphertext with a non-negligible probability, it is equivalent to constructing a challenger C capable of solving ISIS problems.
(1) Initialisation. Suppose adversary A initiates a keyword guessing attack on the system by forging the keyword ciphertext. In that case, challenger C executes the Setup algorithm to generate a series of parameters required by the system and sends the parameters
(2) Inquiry phase 1. For any ciphertext
(3) Inquiry phase 2. For the keyword
(4) Forgery phase. In this phase, adversary A will forge a ciphertext
Analysis: Assuming that
6 Comprehensive Evaluation Analysis
Our paper proposes a searchable encryption scheme based on lattice for log systems combined with blockchain. The test environment is a 64-bit Windows system with 16GB of memory. And the experimental process is completed by the local virtual machine Ubuntu 16.04.6. As shown in Tab. 1, we compare the scheme in this paper with the schemes [30,31] in terms of methodology and hardness assumptions.
Through comparison, the common point between the literature [30] and our scheme is that they both use searchable encryption to ensure the fairness and credibility of the system environment. However, our scheme still provides the security of keyword ciphertexts facing quantum computing attacks. Consequently, the privacy of log files is well protected.
After that, in order to compare the differences between the literature [31] and our proposed scheme in the trapdoor cost, verify algorithm cost, ciphertext size, and trapdoor size, Tab. 2 defines the acronyms used in the experimental process, and Tab. 3 shows the performance comparison results.
Since our scheme uses the trapdoor generation algorithm based on lattice theory and mainly relies on the addition and multiplication of vectors, the overall efficiency of our scheme is superior to traditional cryptography.
Fig. 3 shows the changing trend of the keyword search time under not introducing the blockchain and introducing the blockchain. Since the search operation in the blockchain requires more cost for on-chain transactions, the keyword search time is increased, but the credibility and traceability of the search results can be guaranteed. However, with the linear growth in the number of keywords, the time spent in the blockchain transaction will become insignificant compared to the time used to search for keywords, so the time is less and less affected by the blockchain transaction time.
To solve the keyword guessing attacks launched by quantum attackers and the untrustworthiness of service providers, this paper designs and proposes a searchable encryption scheme based on lattice for log systems in the blockchain. The application of a lattice-based encryption algorithm makes the scheme resist quantum computing and ensures the security of the keyword ciphertext. At the same time, blockchain technology is employed to separate the keyword ciphertext search from the log file storage. Due to the keyword search is performed by designing a smart contract that ensures the reliability of the search results when the credibility of the servicer is unknown. According to the security analysis and experimental simulation, our scheme is secure in quantum attacks while being highly efficient. In the future, we will introduce forward security and optimize computational cost.
Funding Statement: This work was supported by the Open Fund of Advanced Cryptography and System Security Key Laboratory of Sichuan Province (Grant No. SKLACSS-202101), NSFC (Grant Nos. 62176273, 61962009, U1936216), the Foundation of Guizhou Provincial Key Laboratory of Public Big Data (No.2019BDKFJJ010, 2019BDKFJJ014), the Fundamental Research Funds for Beijing Municipal Commission of Education, Beijing Urban Governance Research Base of North China University of Technology, the Natural Science Foundation of Inner Mongolia (2021MS06006), Baotou Kundulun District Science and technology plan project (YF2020013), and Inner Mongolia discipline inspection and supervision big data laboratory open project fund (IMDBD2020020).
Conflicts of Interest: The authors declare that they have no conflicts of interest to report regarding the present study.
1. D. X. Song, D. Wagner and A. Perrig, “Practical techniques for searches on encrypted data,” in Proc. of 2000 IEEE Symp. on Security and Privacy (S&P 2000), Berkeley, CA, USA, pp. 44–55, 2000. [Google Scholar]
2. D. Boneh, G. D. Crescenzo, R. Ostrovsky and G. Persiano, “Public key encryption with keyword search,” in Proc. of 23 th Advances in Cryptology (EUROCRYPT 2004), Interlaken, Switzerland, pp. 506–522, 2004. [Google Scholar]
3. P. Xu, Q. Wu, W. Wang, W. Susilo, J. Domingo-Ferrer et al., “Generating searchable public-key ciphertexts with hidden structures for fast keyword search,” IEEE Transactions on Information Forensics and Security, vol. 10, no. 9, pp. 1993–2006, 2015. [Google Scholar]
4. B. Cui, Z. Liu and L. Wang, “Key-Aggregate Searchable Encryption (KASE) for group data sharing via cloud storage,” IEEE Transactions on Computers, vol. 65, no. 8, pp. 2374–2385, 2016. [Google Scholar]
5. X. Song, C. Dong, D. Yuan, Q. Xu and M. Zhao, “Forward private searchable symmetric encryption with optimized I/O efficiency,” IEEE Transactions on Dependable and Secure Computing, vol. 17, no. 5, pp. 912–927, 2020. [Google Scholar]
6. S. Nakamoto, “Bitcoin: A peer-to-peer electronic cash system,” 2008. [Online]. Available: https://bitcoin.org/bitcoin.pdf. [Google Scholar]
7. F. Baothman, K. Saeedi, K. Aljuhani, S. Alkatheri, M. Almeatani et al., “Computational intelligence approach for municipal council elections using blockchain,” Intelligent Automation & Soft Computing, vol. 27, no. 3, pp. 625–639, 2021. [Google Scholar]
8. Y. Cheng, S. Xu, M. Zang and W. Kong, “LPPA: A lightweight privacy-preserving authentication scheme for the internet of drones,” in Proc. of 2021 IEEE 21st Int. Conf. on Communication Technology (ICCT), Tianjin, China, pp. 656–661, 2021. [Google Scholar]
9. G. Xu, Y. Cao, S. Xu, K. Xiao, X. Liu et al., “A novel post-quantum blind signature for log system in blockchain,” Computer Systems Science and Engineering, vol. 41, no. 3, pp. 945–958, 2022. [Google Scholar]
10. J. Zhang, S. Zhong, J. Wang, X. Yu and O. Alfarraj, “A storage optimization scheme for blockchain transaction databases,” Computer Systems Science and Engineering, vol. 36, no. 3, pp. 521–535, 2021. [Google Scholar]
11. C. Li, Y. Xu, J. Tang and W. Liu, “Real estate management via a decentralized blockchain platform,” Computers. Materials & Continua, vol. 66, no. 2, pp. 1813–1822, 2021. [Google Scholar]
12. C. T. Li, Y. S. Xu, J. H. Tang and W. J. Liu, “Quantum blockchain: A decentralized, encrypted and distributed database based on quantum mechanics,” Journal of Quantum Computing, vol. 1, no. 2, pp. 49–63, 2019. [Google Scholar]
13. J. Zhang, G. Xu, X. Chen, H. Ahmad, X. Liu et al., “Towards privacy-preserving cloud storage: A blockchain approach,” Computers, Materials & Continua, vol. 69, no. 3, pp. 2903–2916, 2021. [Google Scholar]
14. H. L. Chen, G. Xu, Y. L. Chen, X. B. Chen, Y. X. Yang et al., “Cipherchain: A secure and efficient ciphertext blockchain via mPECK,” Journal of Quantum Computing, vol. 2, no. 1, pp. 57–83, 2020. [Google Scholar]
15. S. Latif, Z. Idrees, Z. E. Huma and J. Ahmad, “Blockchain technology for the industrial Internet of Things: A comprehensive survey on security challenges, architectures, applications, and future research directions,” Transactions on Emerging Telecommunications Technologies, vol. 32, no. 11, pp. e4137, 2021. [Google Scholar]
16. S. Latif, Z. Idrees, J. Ahmad, L. Zheng and Z. Zou, “A blockchain-based architecture for secure and trustworthy operations in the industrial Internet of Things,” Journal of Industrial Information Integration, vol. 21, no. 1, pp. 100190, 2021. [Google Scholar]
17. Y. Wang, C. Cao and L. You, “A novel personal privacy data protection scheme based on blockchain and attribute-based encryption,” Journal of Cryptologic Research, vol. 8, pp. 14–27, 2021. [Google Scholar]
18. S. Xu, X. Chen and Y. He, “EVchain: An anonymous blockchain-based system for charging-connected electric vehicles,” Tsinghua Science And Technology, vol. 26, no. 6, pp. 845–856, 2021. [Google Scholar]
19. H. Li, F. Zhang, J. He and H. Tian, “A searchable symmetric encryption scheme using blockchain,” 2017. [Online]. Available: https://doi.org/10.48550/arXiv.1711.01030. [Google Scholar]
20. L. Chen, W. K. Lee, C. C. Chang, K. K. R. Choo and N. Zhang, “Blockchain based searchable encryption for electronic health record sharing,” Future Generation Computer Systems, vol. 95, no. 3, pp. 420–429, 2019. [Google Scholar]
21. M. Nie, X. Pang, W. Chen, S. Gong and T. Yang, “Fair searchable encryption scheme based on ethereum blockchain,” Computer Engineering and Applications, vol. 56, no. 4, pp. 69–75, 2020. [Google Scholar]
22. B. Chen, L. Wu, H. Wang, L. Zhou and D. He, “A blockchain-based searchable public-key encryption with forward and backward privacy for cloud-assisted vehicular social networks,” IEEE Transactions on Vehicular Technology, vol. 69, no. 6, pp. 5813–5825, 2020. [Google Scholar]
23. S. Xu, X. Chen, C. Wang, Y. He, K. Xiao et al., “A lattice-based ring signature scheme to secure automated valet parking,” in Proc. of 16th Wireless Algorithms, Systems, and Applications (WASA 2021), Nanjing, China, vol. 12938, pp. 70–83, 2021. [Google Scholar]
24. P. W. Shor, “Algorithm for quantum computation: Discrete logarithms and factoring algorithm,” in Proc. of 35th Annual Symp. on Foundations of Computer Science (FOCS 1994), Santa Fe, Mexico, USA, pp. 124–134, 1994. [Google Scholar]
25. A. Nabil, D. Poulami, E. Andreas, F. Sebastian, K. Juliane et al., “Deterministic wallets in a quantum world,” in Proc. of 2020 ACM SIGSAC Conf. on Computer and Communications Security (CCS 20), New York, NY, USA, pp. 1017–1031, 2020. [Google Scholar]
26. M. Ajtai, “Generating hard instances of the short basis problem,” in Proc. of 26th Int. Colloquium on Automata, Languages, and Programming (ICALP 1999), Prague, Czech, pp. 1–9, 1999. [Google Scholar]
27. C. Gentry, C. Peikert and V. Vaikuntanathan, “Trapdoors for hard lattices and new cryptographic constructions,” in Proc. of 14th annual ACM symp. on Theory of Computing (STOC 2008), Victoria, British Columbia, Canada, pp. 197–206, 2008. [Google Scholar]
28. S. Agrawal, D. Boneh and X. Boyen, “Efficient lattice (H)IBE in the standard model,” in Proc. of 29th Advances in Cryptology (EUROCRYPT 2010), Riviera, France, vol. 6110, pp. 553–572, 2010. [Google Scholar]
29. S. Agrawal, D. Boneh and X. Boyen, “Lattice basis delegation in fixed dimension and shorter-ciphertext hierarchical IBE,” in Proc. of 30th Advances in Cryptology (CRYPTO 2010), Santa Barbara, CA, USA, vol. 6223, pp. 98–115, 2010. [Google Scholar]
30. Q. Huang and H. Li, “An efficient public-key searchable encryption scheme secure against inside keyword guessing attacks,” Information Sciences, vol. 403-404, no. 1, pp. 1–14, 2017. [Google Scholar]
31. X. Zhang and C. Xu, “Trapdoor security lattice-based public-key searchable encryption with a designated cloud server,” Wireless Personal Communications, vol. 100, no. 3, pp. 907–921, 2018. [Google Scholar]
This work is licensed under a Creative Commons Attribution 4.0 International License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. |