Open Access iconOpen Access

ARTICLE

crossmark

Chosen-Ciphertext Attack Secure Public-Key Encryption with Keyword Search

Hyun Sook Rhee*

Samsung Electronics Co. Ltd., Suwon-si, 16677, Korea

* Corresponding Author: Hyun Sook Rhee. Email: email

Computers, Materials & Continua 2022, 73(1), 69-85. https://doi.org/10.32604/cmc.2022.026751

Abstract

As the use of cloud storage for various services increases, the amount of private personal information along with data stored in the cloud storage is also increasing. To remotely use the data stored on the cloud storage, the data to be stored needs to be encrypted for this reason. Since “searchable encryption” is enable to search on the encrypted data without any decryption, it is one of convenient solutions for secure data management. A public key encryption with keyword search (for short, PEKS) is one of searchable encryptions. Abdalla et al. firstly defined IND-CCA security for PEKS to enhance it’s security and proposed consistent IND-CCA secure PEKS based on the “robust” ANO-CCA secure identity-based encryption(IBE). In this paper, we propose two generic constructions of consistent IND-CCA secure PEKS combining (1) a hierarchical identity based encryption (for short, HIBE) and a signature scheme or (2) a HIBE, an encapsulation, and a message authentication code (for short, MAC) scheme. Our generic constructions identify that HIBE requires the security of a signature or a MAC as well as the weaker “ANO-CPA security (resp., IND-CPA security)” of HIBE than “ANO-CCA security (resp., IND-CCA security)” of IBE required in for achieving IND-CCA secure (resp., consistent) PEKS. Finally, we prove that our generic constructions satisfy IND-CCA security and consistency under the security models.

Keywords


Cite This Article

APA Style
Rhee, H.S. (2022). Chosen-ciphertext attack secure public-key encryption with keyword search. Computers, Materials & Continua, 73(1), 69-85. https://doi.org/10.32604/cmc.2022.026751
Vancouver Style
Rhee HS. Chosen-ciphertext attack secure public-key encryption with keyword search. Comput Mater Contin. 2022;73(1):69-85 https://doi.org/10.32604/cmc.2022.026751
IEEE Style
H.S. Rhee, “Chosen-Ciphertext Attack Secure Public-Key Encryption with Keyword Search,” Comput. Mater. Contin., vol. 73, no. 1, pp. 69-85, 2022. https://doi.org/10.32604/cmc.2022.026751



cc Copyright © 2022 The Author(s). Published by Tech Science Press.
This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
  • 1709

    View

  • 1170

    Download

  • 0

    Like

Share Link