Probably Secure Multi-User Multi-Keyword Searchable Encryption Scheme in Cloud Storage
Title | Probably Secure Multi-User Multi-Keyword Searchable Encryption Scheme in Cloud Storage |
Publication Type | Conference Paper |
Year of Publication | 2019 |
Authors | Li, S., Wang, F., Shi, T., Kuang, J. |
Conference Name | 2019 IEEE 3rd Information Technology, Networking, Electronic and Automation Control Conference (ITNEC) |
Keywords | cipher text keyword, cloud computing, cloud storage, composability, cryptography, data owner, data privacy, data user, decisional Diffie-Hellman, Encryption, encryption workload, Indexes, multi-keyword, Multi-user, privacal data, pubcrawl, Public key, public key cryptography, random oracle model, Receivers, resilience, Resiliency, Searchable encryption, searchable encryption server, secure multiuser multikeyword searchable encryption scheme, security, Servers, simulation program, Trapdoor indistinguishability |
Abstract | Searchable encryption server protects privacal data of data owner from leaks. This paper analyzes the security of a multi-user searchable encryption scheme and points out that this scheme does not satisfy the invisibility of trapdoors. In order to improve the security of the original scheme, this paper proposes a probably secure multi-user multi-keyword searchable encryption scheme. New secheme not only ensures the confidentiality of the cipher text keyword, but also does not increase the encryption workload of the data owner when the new data user joins. In the random oracle model, based on the hard problem of decisional Diffie-Hellman, it is proved that the scheme has trapdoor indistinguishability. In the end, obtained by the simulation program to achieve a new computationally efficient communication at low cost. |
DOI | 10.1109/ITNEC.2019.8729084 |
Citation Key | li_probably_2019 |
- Multi-user
- Trapdoor indistinguishability
- simulation program
- Servers
- security
- secure multiuser multikeyword searchable encryption scheme
- searchable encryption server
- Resiliency
- resilience
- Receivers
- random oracle model
- public key cryptography
- Public key
- pubcrawl
- privacal data
- searchable encryption
- multi-keyword
- Indexes
- encryption workload
- encryption
- decisional Diffie-Hellman
- data user
- data privacy
- data owner
- Cryptography
- composability
- cloud storage
- Cloud Computing
- cipher text keyword