Abstract
Cloud storage technique has becoming increasingly significant in cloud service platform. Before choosing to outsource sensitive data to the cloud server, most of cloud users need to encrypt the important data ahead of time. Recently, the research on how to efficiently retrieve the encrypted data stored in the cloud server has become a hot research topic. Public-key searchable encryption, as a good candidate method, which enables a cloud server to search on a collection of encrypted data with a trapdoor from a receiver, has attracted more researchers’ attention. In this paper, we propose the frist efficient lattice-based public-key searchable encryption with a designated cloud server, which can resist quantum computers attack. In our scheme, we designate a unique cloud server to test and return the search results, thus can remove the secure channel between the cloud server and the receiver. We have proved that our scheme can achieve ciphertext indistinguishability under the hardness of learning with errors, and can achieve trapdoor security in the random oracle model. Moreover, our scheme is secure against off-line keyword guessing attacks from outside adversary.
Similar content being viewed by others
References
Boneh, D., Crescenzo, G. D., Ostrovsky, R., & Persiano, G. (2004). Public key encryption with keyword search. In Proceedings of advances in cryptology—Eurocrypt’04,LNCS 3027 (pp. 506–522).
Baek, J., Safavi-Naini, R., & Susilo, W. (2006). Public key encryption with keyword search revisited. In Proceedings of ACIS’06, LNCS 5072 (pp. 1249–1259).
Rhee, H. S., Park, J. H., Susilo, W., & Lee, D. H. (2010). Trapdoor security in a searchable public-key encryption scheme with a designated tester. Journal of Systems and Software, 83(5), 763–771.
Rhee, H. S., Park, J. H., & Lee, D. H. (2012). Generic construction of designated tester public-key encryption with keyword search. Information Sciences, 205, 93–109.
Zhao, Y., Chen, X., Ma, H., Tang, Q., & Zhu, H. (2012). A new trapdoor-indistinguishable public key encryption with keyword search. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, 3(1/2), 72–81.
Wu, T. Y., Tsai, T. T., & Tseng, Y. M. (2014). Efficient searchable identity-based encryption with a designated server. Annales des Télécommunications, 69(7-8), 391–402.
Shor, P. (1997). Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer. SIAM Journal on Computing, 26(5), 1484–1509.
Ajtai, M. (1999). Generating hard instances of the short basis problem. In Proceedings of automata, languages and Programming ICALP 1999, LNCS 1644 (pp. 1–9). Prague: Springer.
Regev, O. (2005). On lattices, learning with errors, random linear codes, and cryptography. In Proceedings of STOC’05, Baltimore, MD, USA (pp. 84–93).
Gordon, S. D., Katz, J., & Vaikuntanathan, V. (2010). A group signature from lattice assumptions. In Proceedings of advances in cryptology—ASIACRYPT’10, LNCS 6477 (pp. 395–412). Singapore: Springer.
Alwen, J., & Peikert, C. (1996). Generating shorter bases for hard random lattices. In Proceedings of the 20th annual ACM symposium on the theory of computing, STOC 1996, Philadelphia, Pennsylvania, USA (pp. 99–108).
Gentry, C., Peikert, C., & Vaikuntanathan, V. (2008). Trapdoors for hard lattices and new cryptographic constructions. In Proceedings of the 40th annual ACM symposium on theory of computing, STOC 2008, Victoria, British Columbia, Canada, (pp. 197–206).
Agrawal, S., Boneh, D., & Boyen, X. (2010). Lattice basis delegation in fixed dimension and shorter-ciphertext hierarchical IBE. In Proceedings of advances in cryptology—CRYPTO 2010, LNCS (Vol. 6223, pp. 98–115). Springer.
Cash, D., Hofheinz, D., Kiltz, E., & Peikert, C. (2010). Bonsai trees, or how to delegate a lattice basis. In Proceedings of advances in cryptology—EUROCRYPT 2010, LNCS (pp. 523–552). Springer.
Acknowledgements
This work is supported by the National Natural Science Foundation of China (No. 61370203) and China Postdoctoral Science Foundation Funded Project (No. 2017M623008) and Scientific Research Starting Project of SWPU (No. 2017QHZ023).
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Zhang, X., Xu, C. Trapdoor Security Lattice-Based Public-Key Searchable Encryption with a Designated Cloud Server. Wireless Pers Commun 100, 907–921 (2018). https://doi.org/10.1007/s11277-018-5357-6
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11277-018-5357-6