Practical and Secure Integrated PKE+PEKS with Keyword Privacy

Francesco Buccafurri, Gianluca Lax, Rajeev Anand Sahu, Vishal Saraswat

2015

Abstract

Public-key encryption with keyword search (PEKS) schemes are useful to delegate searching capabilities on encrypted data to a third party, who does not hold the entire secret key, but only an appropriate token which allows searching operations but preserves data privacy. We propose an efficient and practical integrated public-key encryption (PKE) and public-key encryption with keyword search (PEKS) scheme (PKE+PEKS) which we prove to be secure in the strongest security notion for PKE+PEKS schemes. In particular, we provide a unified security proof of its joint CCA-security in standard model. The security of our scheme relies on Symmetric eXternal Diffie-Hellman (SXDH) assumption which is a much simpler and more standard hardness assumption than the ones used in most of the comparable schemes. Ours is the first construction to use asymmetric pairings which enable an extremely fast implementation useful for practical applications. Finally we compare our scheme with other proposed integrated PKE+PEKS schemes and provide a relative analysis of its efficiency.

References

  1. Abdalla, M., Bellare, M., Catalano, D., Kiltz, E., Kohno, T., Lange, T., Malone-Lee, J., Neven, G., Paillier, P., and Shi, H. (2005). Searchable encryption revisited: Consistency properties, relation to anonymous ibe, and extensions. In CRYPTO, volume 3621 of LNCS, pages 205-222.
  2. Abdalla, M., Bellare, M., and Neven, G. (2010). Robust encryption. In TCC, volume 5978 of LNCS, pages 480- 497.
  3. Baek, J., Safavi-Naini, R., and Susilo, W. (2006). On the integration of public key data encryption and public key encryption with keyword search. In ISC, volume 4176 of LNCS, pages 217-232.
  4. Baek, J., Safavi-Naini, R., and Susilo, W. (2008). Public key encryption with keyword search revisited. In ICCSA, volume 5072 of LNCS, pages 1249-1259.
  5. Boneh, D., Di Crescenzo, G., Ostrovsky, R., and Persiano, G. (2004). Public key encryption with keyword search. In EuroCrypt, volume 3027 of LNCS, pages 506-522.
  6. Boyen, X. and Waters, B. (2006). Anonymous hierarchical identity-based encryption (without random oracles). In CRYPTO, volume 4117 of LNCS, pages 290-307.
  7. Canetti, R., Goldreich, O., and Halevi, S. (2004). The random oracle methodology, revisited. Journal of the ACM (JACM), 51(4):557-594.
  8. Chen, J., Lim, H., Ling, S., Wang, H., and Wee, H. (2012). Shorter ibe and signatures via asymmetric pairings. In Pairing, volume 7708 of LNCS, pages 122-140.
  9. Chen, Y., Zhang, J., Lin, D., and Zhang, Z. (2014). Generic constructions of integrated pke and peks. Designs, Codes and Cryptography, pages 1-34.
  10. Crescenzo, G. D. and Saraswat, V. (2007). Public key encryption with searchable keywords based on jacobi symbols. In IndoCrypt, volume 4859 of LNCS, pages 282-296.
  11. Dodis, Y. and Katz, J. (2005). Chosen-ciphertext security of multiple encryption. In TCC, volume 3378 of LNCS, pages 188-209.
  12. Fuhr, T. and Paillier, P. (2007). Decryptable searchable encryption. In ProvSec, pages 228-236.
  13. Ibraimi, L., Nikova, S., Hartel, P., and Jonker, W. (2011). Public-key encryption with delegated search. In ACNS, pages 532-549.
  14. Kurosawa, K. (2002). Multi-recipient public-key encryption with shortened ciphertext. In PKC, pages 48-63.
  15. Lu, W., Swaminathan, A., Varna, A. L., and Wu, M. (2009). Enabling search over encrypted multimedia databases. In IS&T/SPIE Electronic Imaging, pages 725418-725418. International Society for Optics and Photonics.
  16. Okamoto, T. and Takashima, K. (2010). Fully secure functional encryption with general relations from the decisional linear assumption. In CRYPTO, volume 6223 of LNCS, pages 191-208.
  17. Shmueli, E., Vaisenberg, R., Elovici, Y., and Glezer, C. (2010). Database encryption: an overview of contemporary challenges and design considerations. ACM SIGMOD Record, 38(3):29-34.
  18. Zhang, R. and Imai, H. (2007). Generic combination of public key encryption with keyword search and public key encryption. In CANS, volume 4856 of LNCS, pages 159-174.
Download


Paper Citation


in Harvard Style

Buccafurri F., Lax G., Sahu R. and Saraswat V. (2015). Practical and Secure Integrated PKE+PEKS with Keyword Privacy . In Proceedings of the 12th International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2015) ISBN 978-989-758-117-5, pages 448-453. DOI: 10.5220/0005577104480453


in Bibtex Style

@conference{secrypt15,
author={Francesco Buccafurri and Gianluca Lax and Rajeev Anand Sahu and Vishal Saraswat},
title={Practical and Secure Integrated PKE+PEKS with Keyword Privacy},
booktitle={Proceedings of the 12th International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2015)},
year={2015},
pages={448-453},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0005577104480453},
isbn={978-989-758-117-5},
}


in EndNote Style

TY - CONF
JO - Proceedings of the 12th International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2015)
TI - Practical and Secure Integrated PKE+PEKS with Keyword Privacy
SN - 978-989-758-117-5
AU - Buccafurri F.
AU - Lax G.
AU - Sahu R.
AU - Saraswat V.
PY - 2015
SP - 448
EP - 453
DO - 10.5220/0005577104480453