Javascript must be enabled to continue!
TCA-PEKS: Trusted Certificateless Authentication Public-key Encryption with Keyword Search scheme in Cloud Storage
View through CrossRef
Abstract
Public key encryption with keyword search (PEKS) technology achieves accurate ciphertext retrieval while protecting data privacy. However, curious or malicious semi-trusted cloud servers can cause privacy breaches, which bring a trusted problem of ciphertext management and searching. To address this problem, we present trusted certificateless authentication public-key encryption with keyword search scheme in cloud storage(TCA-PEKS), which ensuring trusted retrieval, simultaneously resolve the problems of key escrow and certificate management that exists in PEKS. In the scheme, the security of ciphertext storage and verification is strengthened based on blockchain non-tampering feature, which can assist users to verify the correctness of the file. Especially, we construct an open and transparent smart contract to limit the malicious behavior of cloud servers, in which the user’s complete private key splits the secret value and the partial private key, further guarantees the correctness of the retrieval process. Finally, the scheme is proved to satisfy ciphertext and trapdoor indistinguishability under the random oracle model, and the performance evaluation results show that the scheme is highly efficient.
Title: TCA-PEKS: Trusted Certificateless Authentication Public-key Encryption with Keyword Search scheme in Cloud Storage
Description:
Abstract
Public key encryption with keyword search (PEKS) technology achieves accurate ciphertext retrieval while protecting data privacy.
However, curious or malicious semi-trusted cloud servers can cause privacy breaches, which bring a trusted problem of ciphertext management and searching.
To address this problem, we present trusted certificateless authentication public-key encryption with keyword search scheme in cloud storage(TCA-PEKS), which ensuring trusted retrieval, simultaneously resolve the problems of key escrow and certificate management that exists in PEKS.
In the scheme, the security of ciphertext storage and verification is strengthened based on blockchain non-tampering feature, which can assist users to verify the correctness of the file.
Especially, we construct an open and transparent smart contract to limit the malicious behavior of cloud servers, in which the user’s complete private key splits the secret value and the partial private key, further guarantees the correctness of the retrieval process.
Finally, the scheme is proved to satisfy ciphertext and trapdoor indistinguishability under the random oracle model, and the performance evaluation results show that the scheme is highly efficient.
Related Results
Segmented encryption algorithm for privacy and net neutrality in distributed cloud systems
Segmented encryption algorithm for privacy and net neutrality in distributed cloud systems
The advent of distributed cloud systems has revolutionized data storage and access, providing flexibility and scalability across various industries. However, these benefits come wi...
An Authentication and Key Agreement Scheme Based on Roadside Unit Cache for VANET
An Authentication and Key Agreement Scheme Based on Roadside Unit Cache for VANET
Vehicular Ad Hoc Network (VANET) is a wireless Mobile Ad Hoc Network that is used for communication between vehicles, vehicles and fixed access points, and vehicles and pedestrians...
An Efficient Blockchain-Based Verification Scheme with Transferable Authentication Authority
An Efficient Blockchain-Based Verification Scheme with Transferable Authentication Authority
Abstract
In some situations, the transfer of authentication authority is necessary for user authentication. In traditional authentication, a trust mechanism based on a trus...
Blockchain-Based Anonymous Authentication in Edge Computing Environment
Blockchain-Based Anonymous Authentication in Edge Computing Environment
Authentication is an important requirement for the security of edge computing applications. The existing authentication schemes either frequently rely on third-party trusted author...
A Lightweight and Secure Certificateless Encryption Scheme for Smart City IoT Security
A Lightweight and Secure Certificateless Encryption Scheme for Smart City IoT Security
Abstract
The rapid deployment of Internet of Things (IoT) in smart cities urgently demands lightweight encryption schemes to address critical security vulnerabilities in re...
An Authorized Scheme Service Privately Shared Data
An Authorized Scheme Service Privately Shared Data
In the modern digital landscape, the secure sharing of data across distributed systems remains a critical challenge. This paper proposes a blockchain-based architecture that levera...
Developing a Cloud Computing Framework for University Libraries
Developing a Cloud Computing Framework for University Libraries
Our understanding of the library context on security challenges on storing research output on the cloud is inadequate and incomplete. Existing research has mostly focused on profit...
POTENTIAL APPLICATION OF HARDWARE PROTECTED SYMMETRIC AUTHENTICATION MICROCIRCUITS TO ENSURE THE SECURITY OF INTERNET OF THINGS
POTENTIAL APPLICATION OF HARDWARE PROTECTED SYMMETRIC AUTHENTICATION MICROCIRCUITS TO ENSURE THE SECURITY OF INTERNET OF THINGS
The paper objective is to determine the basic schemes and their characteristics for ensuring the security of Internet of Things nodes using symmetric authentication cryptographic m...

