ISSN 1000-1239 CN 11-1777/TP

Journal of Computer Research and Development ›› 2020, Vol. 57 ›› Issue (7): 1404-1414.doi: 10.7544/issn1000-1239.2020.20190671

Previous Articles     Next Articles

Efficient Public Encryption Scheme with Keyword Search for Cloud Storage

Guo Lifeng1,2, Li Zhihao1, Hu Lei3   

  1. 1(School of Computer and Information Technology, Shanxi University, Taiyuan 030006);2(Research Institute of Big Data Science and Industry, Shanxi University, Taiyuan 030006);3(State Key Laboratory of Information Security (Institute of Information Engineering, Chinese Academy of Sciences), Beijing 100093)
  • Online:2020-07-01
  • Supported by: 
    This work was supported by the General Program of the Natural Science Foundation of Shanxi Province of China (201901D111029), the Key Reseach and Development Program (International Science and Technology Cooperation Project) of Shanxi Province of China (201903D421003), the National Natural Science Foundation of China (61202365, 61872226, 61732021), the Natural Science Foundation of Shanxi Province of China (201701D121052), and the Scientific and Technological Innovation Programs of Higher Education Institutions in Shanxi Province (STIP) (2019L0114).

Abstract: Public key encryption with keyword search (PEKS) is a promise cryptography technique in cloud storage which not only can ensure the privacy of stored data but also has search function. In order to resist internal off-line keyword guessing attack, the current solution is to introduce the sender’s secret key and public key to make the keyword ciphertext to realize authentication function. But in these schemes, the receiver must delegate the sender in advance. This situation does not meet the actual requirements that the receiver does not want to delegate the sender. In order to satisfy these applications, we propose an efficient PEKS scheme and prove its security in the standard model. Our PEKS scheme achieves three advantages: Firstly, by introducing the identity of the sender and the server, our scheme can resist the internal and external off-line keyword guessing attack. Furthermore, the scheme doesn’t need to delegate the sender; secondly, by introducing the server’s private key and public key, the trapdoor can be transmitted by a public channel; thirdly, because anyone can verify the correctness of the keyword search ciphertext of keyword search, the scheme can resist chosen keyword ciphertext attack.

Key words: searchable encryption, keyword search, online and offline keyword guessing attacks, bilinear pairing, trapdoor

CLC Number: