3.8 Proceedings Paper

Public Key Based Searchable Encryption with Fine-Grained Sender Permission Control

Journal

PROVABLE AND PRACTICAL SECURITY, PROVSEC 2021
Volume 13059, Issue -, Pages 3-18

Publisher

SPRINGER INTERNATIONAL PUBLISHING AG
DOI: 10.1007/978-3-030-90402-9_1

Keywords

Searchable encryption; Access control; Multi-user

Funding

  1. National Natural Science Foundation of China [62072062, U20A20176, 6210070829]
  2. Natural Science Foundation of Chongqing, China [cstc2019jcyjjqX0026]

Ask authors/readers for more resources

PEKS is a promising cryptographic primitive that allows keyword search in ciphertexts, widely used in fields such as Cloud Computing and Internet of Things. Existing schemes mainly focus on data receiver control, ignoring data sender control. To address this, a concept of PEKS with fine-grained sender permission control has been introduced.
Public key encryption with keyword searched (PEKS) is a promising cryptographic primitive that realizes keyword search in the ciphertext. Since it can provide flexible access to encrypted data, PEKS has been widely used in various fields, such as Cloud Computing and Internet of Things. Until now, many PEKS schemes with fine-grained access control have been proposed to satisfy the requirements of data sharing. However, most previous work only considered the control of data receiver and ignored the control of data sender. In practice, the malicious data sender might correctly generate ciphertexts containing useless information, which in turn increases the computational burden and communication load for the data receiver. To address the above problem, we introduce the concept of PEKS with fine-grained sender permission control, named SCPEKS. In SCPEKS, only those ciphertexts containing matching keywords and of which data sender attributes satisfy the authorized receiver policy will be returned to the data receiver. Also, we present a detailed construction of SCPEKS and prove that the instance achieves ciphertext indistinguishability and unforgeability. Moreover, comparisons with other related schemes suggest that the proposed scheme achieves flexible bidirectional access control at the expense of a slightly higher computation and communication cost.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

3.8
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available