Efficient SSE With Forward ID-Privacy and Authentication in the Multi-Data-Owner Settings
Autor: | Guangye Sui, Huige Wang, Yunlei Zhao, Kefei Chen |
---|---|
Rok vydání: | 2021 |
Předmět: |
Authenticated encryption
General Computer Science Computer science Symmetric searchable encryption 0211 other engineering and technologies Cryptography 02 engineering and technology Security token Encryption Server multi-data-owner 0202 electrical engineering electronic engineering information engineering General Materials Science 021110 strategic defence & security studies Key generation Authentication business.industry General Engineering Plaintext Adversary confidentiality Certificate authentication 020201 artificial intelligence & image processing lcsh:Electrical engineering. Electronics. Nuclear engineering identity-concealment business lcsh:TK1-9971 Computer network |
Zdroj: | IEEE Access, Vol 9, Pp 10443-10459 (2021) |
ISSN: | 2169-3536 |
DOI: | 10.1109/access.2020.3039040 |
Popis: | Based on Sun et al. ’s multi-client symmetric searchable encryption (SSE) scheme (at ESORICS 2016), and combining Zhao’s identity-concealed authenticated encryption (CCS 2016), a new SSE scheme with multi-data-owner functionalities is proposed. By setting two key generation centers, our scheme first implements multi-data-owner SSE. In particular, compared with Sun et al. ’s scheme, the new scheme not only meets the same security requirements stated by them, but also further strengthens the securities of the same category relevant scheme by providing identity-concealment, authentication of data user to server and confidentiality of search token. The identity-concealment aims to provide privacy protection (Forward ID-Privacy) for data users by hiding their identity information, while the authentication is to resist the camouflage attack by applying certificate-based mechanism to our scheme. In particular, the confidentiality of the search token provides replay-attack-resistant by encrypting the plaintext search token generated by data user. While in other works, the adversary can employ the previously generated plaintext search tokens to force the server to perform the same search queries. Furthermore, by efficiency analysis, our scheme reaches almost the same level of efficiency as Sun et al. ’s scheme. |
Databáze: | OpenAIRE |
Externí odkaz: |