scispace - formally typeset
Open AccessJournal ArticleDOI

An Efficient Searchable Public-Key Authenticated Encryption for Cloud-Assisted Medical Internet of Things

TLDR
This paper proposes a new and efficient PAEKS scheme, which uses the idea of Diffie-Hellman key agreement to generate a shared secret key between each sender and receiver, and proves that the scheme is semantically secure against inside keyword guessing attacks in a multiuser setting, under the oracle Diffie -Hellman assumption.
Abstract
In recent years, it has become popular to upload patients’ medical data to a third-party cloud server (TCS) for storage through medical Internet of things. It can reduce the local maintenance burden of the medical data and importantly improve accuracy in the medical treatment. As remote TCS cannot be fully trusted, medical data should be encrypted before uploading, to protect patients’ privacy. However, encryption makes search capabilities difficult for patients and doctors. To address this issue, Huang et al. recently put forward the notion of Public-key Authenticated Encryption with Keyword Search (PAEKS) against inside keyword guessing attacks. However, the existing PAEKS schemes rely on time-consuming computation of parings. Moreover, some PAEKS schemes still have security issues in a multiuser setting. In this paper, we propose a new and efficient PAEKS scheme, which uses the idea of Diffie-Hellman key agreement to generate a shared secret key between each sender and receiver. The shared key will be used to encrypt keywords by the sender and to generate search trapdoors by the receiver. We prove that our scheme is semantically secure against inside keyword guessing attacks in a multiuser setting, under the oracle Diffie-Hellman assumption. Experimental results demonstrate that our PAEKS scheme is more efficient than that of previous ones, especially in terms of keyword searching time.

read more

Content maybe subject to copyright    Report

Citations
More filters
Journal ArticleDOI

Public-key authenticated encryption with keyword search achieving both multi-ciphertext and multi-trapdoor indistinguishability

TL;DR: A new PAEKS scheme is presented and it is proved that it is capable of achieving MCI-security and MTI- security simultaneously with the help of random oracles and achieves a higher security level with a little more cost.
Proceedings ArticleDOI

Improved Security Model for Public-Key Authenticated Encryption with Keyword Search

TL;DR: Wang et al. as mentioned in this paper introduced an improved CI-security model for authenticated encryption with keyword search (PAEKS) to capture fully CKC attacks in a multi-user setting.
Journal ArticleDOI

Blockchain-Enabled Public Key Encryption with Multi-Keyword Search in Cloud Computing

TL;DR: Wang et al. as mentioned in this paper proposed a blockchain-enabled public key encryption scheme with multi-keyword search (BPKEMS), which supports file updates and uses smart contracts to ensure the fairness of transactions between data owner and user without introducing a third party.
Journal ArticleDOI

Pairing-free certificateless authenticated encryption with keyword search

TL;DR: Wang et al. as discussed by the authors proposed an efficient pairing-free certificateless authenticated encryption with keyword search (CLAEKS) scheme and proved its security in the multiple-KGC security model.
Proceedings ArticleDOI

Generic Construction of Public-key Authenticated Encryption with Keyword Search Revisited: Stronger Security and Efficient Construction

TL;DR: A new generic construction of PAEKS is proposed, which considers a multi-sender setting and captures this case, and uses a stronger security model defined by Qin et al. (ProvSec 2021), where an adversary is allowed to query challenge keywords to the encryption and trapdoor oracles.
References
More filters
Journal ArticleDOI

Identity-Based Encryption from the Weil Pairing

TL;DR: This work proposes a fully functional identity-based encryption (IBE) scheme based on bilinear maps between groups and gives precise definitions for secure IBE schemes and gives several applications for such systems.
Proceedings ArticleDOI

Practical techniques for searches on encrypted data

TL;DR: This work describes the cryptographic schemes for the problem of searching on encrypted data and provides proofs of security for the resulting crypto systems, and presents simple, fast, and practical algorithms that are practical to use today.
Book ChapterDOI

Public Key Encryption with Keyword Search

TL;DR: This work defines and construct a mechanism that enables Alice to provide a key to the gateway that enables the gateway to test whether the word “urgent” is a keyword in the email without learning anything else about the email.
Book ChapterDOI

The Oracle Diffie-Hellman Assumptions and an Analysis of DHIES

TL;DR: In this paper, natural assumptions under which DHIES achieves security under chosen-ciphertext attack are found and the assumptions made about the Diffie-Hellman problem are investigated, and they provide security lower bounds.
Journal ArticleDOI

Public key encryption with keyword search secure against keyword guessing attacks without random oracle

TL;DR: This paper defines the strongest model of PEKS which is secure channel free and secure against chosen keyword attack, chosen ciphertext attack, and keyword guessing attack and presents two important security notions namely IND-SCF-CKCA and IND-KGA.
Related Papers (5)