| Literature DB >> 33286195 |
Yunhong Zhou1, Na Li1, Yanmei Tian1, Dezhi An2, Licheng Wang1.
Abstract
With the popularization of cloud computing, many business and individuals prefer to outsource their data to cloud in encrypted form to protect data confidentiality. However, how to search over encrypted data becomes a concern for users. To address this issue, searchable encryption is a novel cryptographic primitive that enables user to search queries over encrypted data stored on an untrusted server while guaranteeing the privacy of the data. Public key encryption with keyword search (PEKS) has received a lot of attention as an important branch. In this paper, we focus on the development of PEKS in cloud by providing a comprehensive research survey. From a technological viewpoint, the existing PEKS schemes can be classified into several variants: PEKS based on public key infrastructure, PEKS based on identity-based encryption, PEKS based on attribute-based encryption, PEKS based on predicate encryption, PEKS based on certificateless encryption, and PEKS supporting proxy re-encryption. Moreover, we propose some potential applications and valuable future research directions in PEKS.Entities:
Keywords: cloud computing; data privacy; public key encryption with keyword search; search query; searchable encryption
Year: 2020 PMID: 33286195 PMCID: PMC7516898 DOI: 10.3390/e22040421
Source DB: PubMed Journal: Entropy (Basel) ISSN: 1099-4300 Impact factor: 2.524
Figure 1Model of public key encryption with keyword search (PEKS) system.
Comparison of several PEKS-PKI schemes.
| Scheme | Search Functionality | Security | Attack Model | |||||
|---|---|---|---|---|---|---|---|---|
| Definition | Assumption | ROM | SCF | OKG | IKG | FI | ||
| Boneh et al. [ | Single | IND-CKA | BDH | ✓ | ||||
| Park et al. [ | Conjunctive | IND-CKA | DBDH | ✓ | ||||
| Park et al. [ | Conjunctive | IND-CKA | DBDHI | ✓ | ||||
| Hwang et al. [ | Conjunctive | IND-CKA | DLDH | ✓ | ||||
| Baek et al. [ | Single | IND-CKA | BDH | ✓ | ✓ | |||
| Rhee et al. [ | Single | IND-CKA | BDH,BDHI | ✓ | ✓ | |||
| Tang et al. [ | Single | IND-CKA | DBDH | ✓ | ✓ | ✓ | ||
| Zhang et al. [ | Conjunctive, subset | TU,AC | DDHI | - | ✓ | |||
| Hu et al. [ | Single | IND-CKA | DLP,HDH | ✓ | ✓ | |||
| Shao et al. [ | Single | IND-KGAs | - | - | ✓ | ✓ | ||
| Huang et al. [ | Single | SS | DBDH,mDLIN | ✓ | ✓ | ✓ | ✓ | |
| Wu et al. [ | Single | IND-CKA | DBDH,CDH | ✓ | ✓ | ✓ | ||
ROM denotes random oracle model. (ROM [39] is an ideal oracle for modelling a cryptographic hash function.) SCF denotes secure channel free. OKG denotes outside keyword guessing attack. IKG denotes inside keyword guessing attack and FI denotes file injection attack. BDH refers to Bilinear Diffie–Hellman assumption. DBDH refers to Decisional Bilinear Diffie–Hellman assumption. DBDHI refers to Decisional Bilinear Diffie–Hellman Inversion assumption. DLDH refers to Decision Linear Diffie–Hellman assumption. BDHI refers to Bilinear Diffie–Hellman Inversion assumption. DDHI refers to Decisional Diffie–Hellman Inversion assumption. DLP refers to Discrete Logarithm Problem. HDH refers to Hash Diffie–Hellman assumption. mDLIN refers to modified Decision Linear assumption. CDH refers to Computational Diffie–Hellman assumption. We write SS for sematic security, TU for trapdoor unforgetable, AC for anonymous of the ciphertext, and IND-KGAs for IND-KGA-server.
Efficiency of the compared PEKS-PKI schemes.
| Scheme | Computation Cost | Communication Cost | |||
|---|---|---|---|---|---|
| Encrypt | Trapdoor | Test | Ciphertext Size | Trapdoor Size | |
| Boneh et al. [ |
|
|
|
|
|
| Park et al. [ |
|
|
|
|
|
| Park et al. [ |
|
|
|
|
|
| Hwang et al. [ |
|
|
|
|
|
| Baek et al. [ |
|
|
|
|
|
| Rhee et al. [ |
|
|
|
|
|
| Tang et al. [ |
|
|
|
|
|
| Zhang et al. [ |
|
|
|
|
|
| Hu et al. [ |
|
|
|
|
|
| Shao et al. [ |
|
|
|
|
|
| Huang et al. [ |
|
|
|
|
|
| Wu et al. [ |
|
|
|
|
|
Notations for PEKS-PKI schemes.
| Notation | Description |
|---|---|
|
| The time of a modular exponentiation |
|
| The time of a bilinear pairing |
|
| The number of elements in |
|
| The number of elements in |
|
| The number of elements in |
|
| The security parameter |
|
| The bit length of security parameter |
|
| The number of the keywords |
Figure 2The communication between Alice and Bob.
Comparison of several PEKS-IBE schemes.
| Scheme | Search Functionality | Security | Attack Model | |||||
|---|---|---|---|---|---|---|---|---|
| Definition | Assumption | ROM | SCF | OKG | IKG | FI | ||
| Boneh et al. [ | Single | IND-CKA | BDH | ✓ | ||||
| Khader et al. [ | conjunctive | IND-CKA | DDH | ✓ | ||||
| Crescenzo et al. [ | Single | IND-CKA | QIP | ✓ | ||||
| Tian et al. [ | Single | IND-CKA | DLP | ✓ | ✓ | |||
| Wu et al. [ | Conjunctive | IND-CKA | BDH,CDH | ✓ | ✓ | ✓ | ||
| Wang et al. [ | Multi-user | IND-CKA | DBDH | ✓ | ✓ | ✓ | ||
| Lu et al. [ | Conjunctive | IND-CKA | DBDH,CDH | ✓ | ✓ | ✓ | ||
BDH refers to Bilinear Diffie–Hellman assumption. DBDH refers to Decisional Bilinear Diffie–Hellman assumption. DDH refers to Decisional Diffie–Hellman assumption. QIP refers to Quadratic Indistinguishability Problem. DLP refers to Discrete Logarithm Problem. CDH refers to Computational Diffie–Hellman assumption.
Efficiency of the compared PEKS-IBE schemes.
| Scheme | Computation Cost | Communication Cost | |||
|---|---|---|---|---|---|
| Encrypt | Trapdoor | Test | Ciphertext Size | Trapdoor Size | |
| Boneh et al. [ |
|
|
|
|
|
| Khader et al. [ |
| - |
|
|
|
| Crescenzo et al. [ |
|
|
|
|
|
| Tian et al. [ |
|
|
|
|
|
| Wu et al. [ |
|
|
|
|
|
| Wang et al. [ |
|
|
|
|
|
| Lu et al. [ |
|
|
|
|
|
Notations for PEKS-IBE schemes.
| Notation | Description |
|---|---|
|
| The time of a modular exponentiation |
|
| The time of a bilinear pairing |
|
| The number of elements in |
|
| The number of elements in |
|
| The number of elements in |
|
| The security parameter |
|
| The bit length of security parameter |
|
| The number of the keywords |
|
| The Jacobi symbol |
|
| The number of the users share the data |
Figure 3Comparison between public key encryption (PKE) and attribute-based encryption (ABE).
Comparison of several PEKS-ABE schemes.
| Scheme | Search Functionality | Security | Attack Model | |||||
|---|---|---|---|---|---|---|---|---|
| Definition | Assumption | ROM | SCF | OKG | IKG | FI | ||
| Wang et al. [ | Single | SeS | q-DBDH | - | ✓ | ✓ | ||
| Zheng et al. [ | Verifiable | IND-CKA | DLIN | ✓ | ||||
| Zheng et al. [ | Verifiable | IND-CKA | DLIN | |||||
| Sun et al. [ | Verifiable | IND-CKA | DBDH | |||||
| Li et al. [ | Single | CPA | DBDH | ✓ | ✓ | |||
| Miao et al. [ | Multi-keyword | IND-CKA | DBDH | ✓ | ||||
| Cao et al. [ | Single | IND-CKA | BDH | ✓ | ||||
| Miao et al. [ | Single | SeS | DBDH | ✓ | ||||
BDH refers to Bilinear Diffie–Hellman assumption. DBDH refers to Decisional Bilinear Diffie–Hellman assumption. q-DBDH refers to q-parallel Decisional Bilinear Diffie–Hellman assumption. DLIN refers to Decisional Linear assumption. We write SeS for selective security and CPA for choose plaintext attack.
Efficiency of the compared PEKS-ABE schemes.
| Scheme | Computation Cost | Communication Cost | |||
|---|---|---|---|---|---|
| Encrypt | Trapdoor | Test | Ciphertext Size | Trapdoor Size | |
| Wang et al. [ |
|
|
|
|
|
| Zheng et al. [ |
|
|
|
|
|
| Zheng et al. [ |
|
|
|
|
|
| Li et al. [ |
|
|
|
|
|
| Sun et al. [ |
|
|
|
|
|
| Miao et al. [ |
|
|
|
|
|
| Cao et al. [ |
|
|
|
|
|
| Miao et al. [ |
|
|
|
|
|
Notations for PEKS-ABE schemes.
| Notation | Description |
|---|---|
|
| The time of a modular exponentiation |
|
| The time of a bilinear pairing |
|
| The number of elements in |
|
| The number of elements in |
|
| The number of elements in |
|
| The number of a data user’s attribute |
|
| The number of attributes that are involved in a data owner’s access control policy |
Comparison of several PEKS-PE schemes.
| Scheme | Search Functionality | Security | Attack Model | |||||
|---|---|---|---|---|---|---|---|---|
| Definition | Assumption | ROM | SCF | OKG | IKG | FI | ||
| Zhu et al. [ | Single | PP,SP | ECDLP | - | ||||
| Zhang et al. [ | Disjunctive,conjunctive | CPA | - | - | ||||
| Zhang et al. [ | Semantic | CPA,IND-CKA | - | - | ✓ | |||
| Zhang et al. [ | Conjunctive,disjunctive | IND-CKA | BDHI,DLIN | ✓ | ||||
ECDLP refers to Elliptic Curve Discrete Logarithm Problem, BDHI refers to Bilinear Diffie–Hellman Inversion assumption, DLIN refers to Decision Linear assumption. We write PP for predicate privacy, SP for statistics privacy and CPA for choose plaintext attack.
Efficiency of the compared PEKS-PE schemes.
| Scheme | Computation Cost | Communication Cost | |||
|---|---|---|---|---|---|
| Encrypt | Trapdoor | Test | Ciphertext Size | Trapdoor Size | |
| Zhu et al. [ |
|
|
|
|
|
| Zhang et al. [ |
|
|
|
|
|
| Zhang et al. [ |
|
|
|
|
|
| Zhang et al. [ |
|
|
|
|
|
Notations for PEKS-PE schemes.
| Notation | Description |
|---|---|
|
| The time of a modular exponentiation |
|
| The time of a bilinear pairing |
|
| The number of elements in |
|
| The number of elements in |
|
| The number of elements in |
|
| The number of the keywords |
|
| The bit length of security parameter |
Comparison of several PEKS-CLE schemes.
| Scheme | Search Functionality | Security | Attack Model | |||||
|---|---|---|---|---|---|---|---|---|
| Definition | Assumption | ROM | SCF | OKG | IKG | FI | ||
| Peng et al. [ | Single | IND-CKA | BDH | ✓ | ✓ | ✓ | ||
| Zheng et al. [ | Single | CI | DLIN | |||||
| Islam et al. [ | Single | CI,DI | CDH,BDH | - | ✓ | ✓ | ||
| Ma et al. [ | Single | IND-CKA | BDH | ✓ | ✓ | |||
| Wu et al. [ | Single | SS | CBDH | ✓ | ✓ | ✓ | ✓ | |
| Lu et al. [ | Single | IND-CKA | CDH | ✓ | ||||
BDH refers to Bilinear Diffie–Hellman assumption. DLIN refers to Decisional Linear assumption. CDH refers to Computational Diffie–Hellman assumption. CBDH refers to Computational Bilinear Diffie–Hellman assumption. We write CI for ciphertext indistinguishability, DI for trapdoor indistinguishability, and SS for semantically secure.
Efficiency of the compared PEKS-CLE schemes.
| Scheme | Computation Cost | Communication Cost | |||
|---|---|---|---|---|---|
| Encrypt | Trapdoor | Test | Ciphertext Size | Trapdoor Size | |
| Peng et al. [ |
|
|
|
|
|
| Zheng et al. [ |
|
|
|
|
|
| Islam et al. [ |
|
|
|
|
|
| Ma et al. [ |
|
|
|
|
|
| Wu et al. [ |
|
|
|
|
|
| Lu et al. [ |
|
|
|
|
|
Notations for PEKS-CLE schemes.
| Notation | Description |
|---|---|
|
| The time of a modular exponentiation |
|
| The time of a bilinear pairing |
|
| The number of elements in |
|
| The number of elements in |
|
| The number of elements in |
Figure 4PRE model.
Comparison of several PEKS-PRE schemes.
| Scheme | Search Functionality | Security | Attack Model | ||||
|---|---|---|---|---|---|---|---|
| Definition | Assumption | ROM | SCF | OKG | CA | ||
| Yau et al. [ | Single | IND-CKA | BDH | ✓ | |||
| Yau et al. [ | Single | IND-CKA | BDH | ✓ | ✓ | ||
| Wang et al. [ | Conjunctive | wIND-CCA | q-BDHI | ✓ | |||
| Guo et al. [ | Verifiable | IND-CKA | QDBDH,DBDH,HDH | ✓ | ✓ | ||
| Yang et al. [ | Conjunctive | IND-CKA | DBDH,DDH | ✓ | ✓ | ||
| Chen et al. [ | Single | IND-CKA | q-BDHE | ✓ | ✓ | ||
BDH refers to Bilinear Diffie–Hellman assumption. DBDH refers to Decisional Bilinear Diffie–Hellman assumption. q-BDHI refers to q-Bilinear Diffie–Hellman Inversion assumption. QDBDH refers to Quotient Decisional Bilinear Diffie–Hellman assumption. HDH refers to Hash Diffie–Hellman assumption. DDH refers to Decisional Diffie–Hellman assumption. q-BDHE refers to q-parallel Bilinear Diffie–Hellman Exponent assumption. CA denotes Collusion Attack, namely the proxy colluded with the delegate. We write wIND-CCA for weakly IND-CCA(chosen ciphertext attack).
Efficiency of the compared PEKS-PRE schemes.
| Scheme | Computation Cost | Communication Cost | |||
|---|---|---|---|---|---|
| Encrypt | Trapdoor | Test | Ciphertext Size | Trapdoor Size | |
| Yau et al. [ |
|
|
|
|
|
| Yau et al. [ |
|
|
|
|
|
| Wang et al. [ |
|
|
|
|
|
| Guo et al. [ |
|
|
|
|
|
| Yang et al. [ |
|
|
|
|
|
| Chen et al. [ |
|
|
|
|
|
Notations for PEKS-PRE schemes.
| Notation | Description |
|---|---|
|
| The time of a modular exponentiation |
|
| The time of a bilinear pairing |
|
| The number of elements in |
|
| The number of elements in |
|
| The number of elements in |
|
| The number of the keywords |
|
| The bit length of security parameter |
|
| The number of a data user’s attribute |
|
| The number of attributes that are involved in a data owner’s access control policy |