Public‐key encryption with keyword search secure against continual memory attacks

Continual memory attacks, inspired by recent realistic physical attacks, have broken many cryptographic schemes that were considered secure in traditional cryptography model. In this paper, we consider the continual memory leakage resilience in public‐key encryption with keyword search scheme (PEKS)...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Security and communication networks 2016-07, Vol.9 (11), p.1613-1629
Hauptverfasser: Hu, Chengyu, Yang, Rupeng, Liu, Pengtao, Yu, Zuoxia, Zhou, Yongbin, Xu, Qiuliang
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 1629
container_issue 11
container_start_page 1613
container_title Security and communication networks
container_volume 9
creator Hu, Chengyu
Yang, Rupeng
Liu, Pengtao
Yu, Zuoxia
Zhou, Yongbin
Xu, Qiuliang
description Continual memory attacks, inspired by recent realistic physical attacks, have broken many cryptographic schemes that were considered secure in traditional cryptography model. In this paper, we consider the continual memory leakage resilience in public‐key encryption with keyword search scheme (PEKS). We give the definition of continual memory leakage resilience security for PEKS, which allows continual secret key leakage in the trapdoor generation algorithm rather than leakage of trapdoor itself. We believe that the definition is more suitable for practical PEKS scenario. To construct a concrete PEKS scheme secure against continual memory attacks, we firstly obtain a continual master‐key leakage‐resilient anonymous identity‐based encryption (IBE) scheme by applying the generic tool provided by Lewko et al. to a fully secure anonymous IBE scheme that comes from the fully secure anonymous hierarchical identity‐based encryption (HIBE) scheme of De Caro and colleagues. Then, we transform our continual master‐key leakage‐resilient anonymous IBE scheme to a PEKS scheme using the generic Anonymous IBE‐to‐PEKS transformation and prove its continual leakage‐resilient security. Copyright © 2016 John Wiley & Sons, Ltd. In this paper, we propose a method of constructing public‐key encryption with keyword search scheme (PEKS) secure against continual memory attacks which allow the adversary to continually obtain secret key leakage in the trapdoor generation algorithm. Our method applies identity‐based encryption(IBE)‐to‐PEKS transformation to a master‐key leakage‐resilient anonymous IBE scheme. Also, we give a concrete master‐key leakage‐resilient anonymous IBE scheme which can be used to construct a concrete PEKS scheme secure against continual memory attacks.
doi_str_mv 10.1002/sec.1451
format Article
fullrecord <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_miscellaneous_1825499330</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>1825499330</sourcerecordid><originalsourceid>FETCH-LOGICAL-c3261-17f8717a9e716099e3ababb3c7be4e101e5b3612460f780d57335c2cd3cec58d3</originalsourceid><addsrcrecordid>eNp1kM1Kw0AUhQdRsFbBRxhw4yZ17kySySyl1B8oKFTXw2RyY9Pmp84klOx8BJ_RJzG1oiC4OofLx-HyEXIObAKM8SuPdgJhBAdkBEqogAHnhz8dwmNy4v2KsRhCGY7I4rFLy8J-vL2vsadYW9dv2qKp6bZol3S4bRuXUY_G2eUQtnNIzYspat9S29RtUXempBVWjeupaVtj1_6UHOWm9Hj2nWPyfDN7mt4F84fb--n1PLCCxxCAzBMJ0iiUEDOlUJjUpKmwMsUQgQFGqYiBhzHLZcKySAoRWW4zYdFGSSbG5HK_u3HNa4e-1VXhLZalqbHpvIaER6FSQrABvfiDrprO1cN3GqSKuZBCwu-gdY33DnO9cUVlXK-B6Z1dPRjQO7sDGuzRbVFi_y-nF7PpF_8JQwN8Dw</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>1796237371</pqid></control><display><type>article</type><title>Public‐key encryption with keyword search secure against continual memory attacks</title><source>Elektronische Zeitschriftenbibliothek - Frei zugängliche E-Journals</source><source>Alma/SFX Local Collection</source><creator>Hu, Chengyu ; Yang, Rupeng ; Liu, Pengtao ; Yu, Zuoxia ; Zhou, Yongbin ; Xu, Qiuliang</creator><creatorcontrib>Hu, Chengyu ; Yang, Rupeng ; Liu, Pengtao ; Yu, Zuoxia ; Zhou, Yongbin ; Xu, Qiuliang</creatorcontrib><description>Continual memory attacks, inspired by recent realistic physical attacks, have broken many cryptographic schemes that were considered secure in traditional cryptography model. In this paper, we consider the continual memory leakage resilience in public‐key encryption with keyword search scheme (PEKS). We give the definition of continual memory leakage resilience security for PEKS, which allows continual secret key leakage in the trapdoor generation algorithm rather than leakage of trapdoor itself. We believe that the definition is more suitable for practical PEKS scenario. To construct a concrete PEKS scheme secure against continual memory attacks, we firstly obtain a continual master‐key leakage‐resilient anonymous identity‐based encryption (IBE) scheme by applying the generic tool provided by Lewko et al. to a fully secure anonymous IBE scheme that comes from the fully secure anonymous hierarchical identity‐based encryption (HIBE) scheme of De Caro and colleagues. Then, we transform our continual master‐key leakage‐resilient anonymous IBE scheme to a PEKS scheme using the generic Anonymous IBE‐to‐PEKS transformation and prove its continual leakage‐resilient security. Copyright © 2016 John Wiley &amp; Sons, Ltd. In this paper, we propose a method of constructing public‐key encryption with keyword search scheme (PEKS) secure against continual memory attacks which allow the adversary to continually obtain secret key leakage in the trapdoor generation algorithm. Our method applies identity‐based encryption(IBE)‐to‐PEKS transformation to a master‐key leakage‐resilient anonymous IBE scheme. Also, we give a concrete master‐key leakage‐resilient anonymous IBE scheme which can be used to construct a concrete PEKS scheme secure against continual memory attacks.</description><identifier>ISSN: 1939-0114</identifier><identifier>EISSN: 1939-0122</identifier><identifier>DOI: 10.1002/sec.1451</identifier><language>eng</language><publisher>London: Hindawi Limited</publisher><subject>anonymous identity‐based encryption ; Concrete construction ; continual memory attacks ; Cryptography ; Encryption ; keyword search ; Leakage ; Polyetherketones ; public‐key encryption ; Searching ; Security ; Transformations</subject><ispartof>Security and communication networks, 2016-07, Vol.9 (11), p.1613-1629</ispartof><rights>Copyright © 2016 John Wiley &amp; Sons, Ltd.</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c3261-17f8717a9e716099e3ababb3c7be4e101e5b3612460f780d57335c2cd3cec58d3</citedby><cites>FETCH-LOGICAL-c3261-17f8717a9e716099e3ababb3c7be4e101e5b3612460f780d57335c2cd3cec58d3</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,780,784,27924,27925</link.rule.ids></links><search><creatorcontrib>Hu, Chengyu</creatorcontrib><creatorcontrib>Yang, Rupeng</creatorcontrib><creatorcontrib>Liu, Pengtao</creatorcontrib><creatorcontrib>Yu, Zuoxia</creatorcontrib><creatorcontrib>Zhou, Yongbin</creatorcontrib><creatorcontrib>Xu, Qiuliang</creatorcontrib><title>Public‐key encryption with keyword search secure against continual memory attacks</title><title>Security and communication networks</title><description>Continual memory attacks, inspired by recent realistic physical attacks, have broken many cryptographic schemes that were considered secure in traditional cryptography model. In this paper, we consider the continual memory leakage resilience in public‐key encryption with keyword search scheme (PEKS). We give the definition of continual memory leakage resilience security for PEKS, which allows continual secret key leakage in the trapdoor generation algorithm rather than leakage of trapdoor itself. We believe that the definition is more suitable for practical PEKS scenario. To construct a concrete PEKS scheme secure against continual memory attacks, we firstly obtain a continual master‐key leakage‐resilient anonymous identity‐based encryption (IBE) scheme by applying the generic tool provided by Lewko et al. to a fully secure anonymous IBE scheme that comes from the fully secure anonymous hierarchical identity‐based encryption (HIBE) scheme of De Caro and colleagues. Then, we transform our continual master‐key leakage‐resilient anonymous IBE scheme to a PEKS scheme using the generic Anonymous IBE‐to‐PEKS transformation and prove its continual leakage‐resilient security. Copyright © 2016 John Wiley &amp; Sons, Ltd. In this paper, we propose a method of constructing public‐key encryption with keyword search scheme (PEKS) secure against continual memory attacks which allow the adversary to continually obtain secret key leakage in the trapdoor generation algorithm. Our method applies identity‐based encryption(IBE)‐to‐PEKS transformation to a master‐key leakage‐resilient anonymous IBE scheme. Also, we give a concrete master‐key leakage‐resilient anonymous IBE scheme which can be used to construct a concrete PEKS scheme secure against continual memory attacks.</description><subject>anonymous identity‐based encryption</subject><subject>Concrete construction</subject><subject>continual memory attacks</subject><subject>Cryptography</subject><subject>Encryption</subject><subject>keyword search</subject><subject>Leakage</subject><subject>Polyetherketones</subject><subject>public‐key encryption</subject><subject>Searching</subject><subject>Security</subject><subject>Transformations</subject><issn>1939-0114</issn><issn>1939-0122</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2016</creationdate><recordtype>article</recordtype><sourceid>ABUWG</sourceid><sourceid>AFKRA</sourceid><sourceid>AZQEC</sourceid><sourceid>BENPR</sourceid><sourceid>CCPQU</sourceid><sourceid>DWQXO</sourceid><sourceid>GNUQQ</sourceid><recordid>eNp1kM1Kw0AUhQdRsFbBRxhw4yZ17kySySyl1B8oKFTXw2RyY9Pmp84klOx8BJ_RJzG1oiC4OofLx-HyEXIObAKM8SuPdgJhBAdkBEqogAHnhz8dwmNy4v2KsRhCGY7I4rFLy8J-vL2vsadYW9dv2qKp6bZol3S4bRuXUY_G2eUQtnNIzYspat9S29RtUXempBVWjeupaVtj1_6UHOWm9Hj2nWPyfDN7mt4F84fb--n1PLCCxxCAzBMJ0iiUEDOlUJjUpKmwMsUQgQFGqYiBhzHLZcKySAoRWW4zYdFGSSbG5HK_u3HNa4e-1VXhLZalqbHpvIaER6FSQrABvfiDrprO1cN3GqSKuZBCwu-gdY33DnO9cUVlXK-B6Z1dPRjQO7sDGuzRbVFi_y-nF7PpF_8JQwN8Dw</recordid><startdate>20160725</startdate><enddate>20160725</enddate><creator>Hu, Chengyu</creator><creator>Yang, Rupeng</creator><creator>Liu, Pengtao</creator><creator>Yu, Zuoxia</creator><creator>Zhou, Yongbin</creator><creator>Xu, Qiuliang</creator><general>Hindawi Limited</general><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>7SP</scope><scope>8FD</scope><scope>8FE</scope><scope>8FG</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>GNUQQ</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K7-</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>P5Z</scope><scope>P62</scope><scope>PIMPY</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope></search><sort><creationdate>20160725</creationdate><title>Public‐key encryption with keyword search secure against continual memory attacks</title><author>Hu, Chengyu ; Yang, Rupeng ; Liu, Pengtao ; Yu, Zuoxia ; Zhou, Yongbin ; Xu, Qiuliang</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c3261-17f8717a9e716099e3ababb3c7be4e101e5b3612460f780d57335c2cd3cec58d3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2016</creationdate><topic>anonymous identity‐based encryption</topic><topic>Concrete construction</topic><topic>continual memory attacks</topic><topic>Cryptography</topic><topic>Encryption</topic><topic>keyword search</topic><topic>Leakage</topic><topic>Polyetherketones</topic><topic>public‐key encryption</topic><topic>Searching</topic><topic>Security</topic><topic>Transformations</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Hu, Chengyu</creatorcontrib><creatorcontrib>Yang, Rupeng</creatorcontrib><creatorcontrib>Liu, Pengtao</creatorcontrib><creatorcontrib>Yu, Zuoxia</creatorcontrib><creatorcontrib>Zhou, Yongbin</creatorcontrib><creatorcontrib>Xu, Qiuliang</creatorcontrib><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics &amp; Communications Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central (Alumni Edition)</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies &amp; Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>ProQuest Central Student</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Computer Science Collection</collection><collection>Computer Science Database</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>Advanced Technologies &amp; Aerospace Database</collection><collection>ProQuest Advanced Technologies &amp; Aerospace Collection</collection><collection>Publicly Available Content Database</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><jtitle>Security and communication networks</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Hu, Chengyu</au><au>Yang, Rupeng</au><au>Liu, Pengtao</au><au>Yu, Zuoxia</au><au>Zhou, Yongbin</au><au>Xu, Qiuliang</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Public‐key encryption with keyword search secure against continual memory attacks</atitle><jtitle>Security and communication networks</jtitle><date>2016-07-25</date><risdate>2016</risdate><volume>9</volume><issue>11</issue><spage>1613</spage><epage>1629</epage><pages>1613-1629</pages><issn>1939-0114</issn><eissn>1939-0122</eissn><abstract>Continual memory attacks, inspired by recent realistic physical attacks, have broken many cryptographic schemes that were considered secure in traditional cryptography model. In this paper, we consider the continual memory leakage resilience in public‐key encryption with keyword search scheme (PEKS). We give the definition of continual memory leakage resilience security for PEKS, which allows continual secret key leakage in the trapdoor generation algorithm rather than leakage of trapdoor itself. We believe that the definition is more suitable for practical PEKS scenario. To construct a concrete PEKS scheme secure against continual memory attacks, we firstly obtain a continual master‐key leakage‐resilient anonymous identity‐based encryption (IBE) scheme by applying the generic tool provided by Lewko et al. to a fully secure anonymous IBE scheme that comes from the fully secure anonymous hierarchical identity‐based encryption (HIBE) scheme of De Caro and colleagues. Then, we transform our continual master‐key leakage‐resilient anonymous IBE scheme to a PEKS scheme using the generic Anonymous IBE‐to‐PEKS transformation and prove its continual leakage‐resilient security. Copyright © 2016 John Wiley &amp; Sons, Ltd. In this paper, we propose a method of constructing public‐key encryption with keyword search scheme (PEKS) secure against continual memory attacks which allow the adversary to continually obtain secret key leakage in the trapdoor generation algorithm. Our method applies identity‐based encryption(IBE)‐to‐PEKS transformation to a master‐key leakage‐resilient anonymous IBE scheme. Also, we give a concrete master‐key leakage‐resilient anonymous IBE scheme which can be used to construct a concrete PEKS scheme secure against continual memory attacks.</abstract><cop>London</cop><pub>Hindawi Limited</pub><doi>10.1002/sec.1451</doi><tpages>17</tpages><oa>free_for_read</oa></addata></record>
fulltext fulltext
identifier ISSN: 1939-0114
ispartof Security and communication networks, 2016-07, Vol.9 (11), p.1613-1629
issn 1939-0114
1939-0122
language eng
recordid cdi_proquest_miscellaneous_1825499330
source Elektronische Zeitschriftenbibliothek - Frei zugängliche E-Journals; Alma/SFX Local Collection
subjects anonymous identity‐based encryption
Concrete construction
continual memory attacks
Cryptography
Encryption
keyword search
Leakage
Polyetherketones
public‐key encryption
Searching
Security
Transformations
title Public‐key encryption with keyword search secure against continual memory attacks
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-04T16%3A44%3A55IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Public%E2%80%90key%20encryption%20with%20keyword%20search%20secure%20against%20continual%20memory%20attacks&rft.jtitle=Security%20and%20communication%20networks&rft.au=Hu,%20Chengyu&rft.date=2016-07-25&rft.volume=9&rft.issue=11&rft.spage=1613&rft.epage=1629&rft.pages=1613-1629&rft.issn=1939-0114&rft.eissn=1939-0122&rft_id=info:doi/10.1002/sec.1451&rft_dat=%3Cproquest_cross%3E1825499330%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=1796237371&rft_id=info:pmid/&rfr_iscdi=true