Journal on Communications ›› 2023, Vol. 44 ›› Issue (8): 61-77.doi: 10.11959/j.issn.1000-436x.2023156

• Papers • Previous Articles    

Efficient certificateless searchable encryption scheme with verifiability

Xinhua CUI1,2,3, Youliang TIAN1,2,4, Qijia ZHANG1,2   

  1. 1 State Key Laboratory of Public Big Data, Guiyang 550025, China
    2 College of Computer Science and Technology, Guizhou University, Guiyang 550025, China
    3 College of Economics and Management, Guizhou Normal University, Guiyang 550025, China
    4 Institute of Cryptography &Data Security, Guizhou University, Guiyang 550025, China
  • Revised:2023-06-06 Online:2023-08-01 Published:2023-08-01
  • Supported by:
    The National Key Research and Development Program of China(2021YFB3101100);The National Natural Science Foundation of China(U1836205);The National Natural Science Foundation of China(62272123);Project of High-level Innovative Talents of Guizhou Province([2020]6008);Science and Technology Program of Guiyang([2021]1-5);Science and Technology Program of Guiyang([2022]2-4);Science and Technology Program of Guizhou Province([2020]5017);Science and Technology Program of Guizhou Province([2020]5017);Science and Technology Program of Guizhou Province([2022]065)

Abstract:

Searchable encryption offers an effective way to achieve data privacy protection and keyword search in cloud computing environments.Currently, the existing schemes not only lack dynamic update and efficient verification mechanism, but also suffer from the certificate management burden and key escrow issue.To address these issues, a verifiable multi-keyword searchable encryption scheme based on improved Merkle-Tree had been proposed recently.However, through cryptoanalysis, that scheme could not achieve the indistinguishability.With improvement, an efficient able certificateless searchable encryption scheme with verifiability was proposed.Rigorous analysis show that the proposed scheme not only supports the indistinguishability and the unforgeability, but also enjoys higher computing efficiency and lower communication cost, which is more suitable for terminal devices with limited resources.

Key words: certificateless encryption, searchable encryption, verifiability, dynamic updating

CLC Number: 

No Suggested Reading articles found!