Home > Research > Publications & Outputs > Blockchain-based privacy-preserving public key ...

Associated organisational unit

Links

Text available via DOI:

View graph of relations

Blockchain-based privacy-preserving public key searchable encryption with strong traceability

Research output: Contribution to Journal/MagazineJournal articlepeer-review

Published

Standard

Blockchain-based privacy-preserving public key searchable encryption with strong traceability. / Han, Yue; Han, Jinguang; Meng, Weizhi et al.
In: Journal of Systems Architecture, Vol. 155, 103264, 31.10.2024.

Research output: Contribution to Journal/MagazineJournal articlepeer-review

Harvard

APA

Han, Y., Han, J., Meng, W., Lai, J., & Wu, G. (2024). Blockchain-based privacy-preserving public key searchable encryption with strong traceability. Journal of Systems Architecture, 155, Article 103264. https://doi.org/10.1016/j.sysarc.2024.103264

Vancouver

Han Y, Han J, Meng W, Lai J, Wu G. Blockchain-based privacy-preserving public key searchable encryption with strong traceability. Journal of Systems Architecture. 2024 Oct 31;155:103264. Epub 2024 Aug 24. doi: 10.1016/j.sysarc.2024.103264

Author

Han, Yue ; Han, Jinguang ; Meng, Weizhi et al. / Blockchain-based privacy-preserving public key searchable encryption with strong traceability. In: Journal of Systems Architecture. 2024 ; Vol. 155.

Bibtex

@article{466f89c413224fffa38b1c242bb9a6d1,
title = "Blockchain-based privacy-preserving public key searchable encryption with strong traceability",
abstract = "Public Key Searchable Encryption (PKSE) has essential applications in cloud storage because it allows users to search over encrypted data. To identify illegal users, many traceable PKSE schemes have been proposed. However, existing schemes cannot trace the keywords that illegal users searched and protect users{\textquoteright} privacy simultaneously. It is challenging to bind users{\textquoteright} identities and keywords while protecting their privacy. Moreover existing traceable PKSE schemes do not consider the unforgeability and immutability of trapdoor query records which leads to frame-up and denial. In this paper, to address these problems, we propose a blockchain-based privacy-preserving PKSE with strong traceability (BP3KSEST) scheme. The main features of our scheme are as follows: (1) authorized users can obtain trapdoors from trapdoor generation center without releasing their identities and keywords; (2) When required, a trusted third party (TTP) can trace both illegal users{\textquoteright} identities and the keywords which they searched; (3) trapdoor query records are unforgeable and immutable. This scheme is appropriate for scenarios where privacy must be addressed, e.g, electronic health record (EHR). We formalize the definition and security model of our BP3KSEST scheme. Furthermore, we present a concrete construction and prove its security. Finally, the implementation is conducted to analyze its efficiency.",
author = "Yue Han and Jinguang Han and Weizhi Meng and Jianchang Lai and Ge Wu",
year = "2024",
month = oct,
day = "31",
doi = "10.1016/j.sysarc.2024.103264",
language = "English",
volume = "155",
journal = "Journal of Systems Architecture",
issn = "1383-7621",
publisher = "Elsevier Science B.V.",

}

RIS

TY - JOUR

T1 - Blockchain-based privacy-preserving public key searchable encryption with strong traceability

AU - Han, Yue

AU - Han, Jinguang

AU - Meng, Weizhi

AU - Lai, Jianchang

AU - Wu, Ge

PY - 2024/10/31

Y1 - 2024/10/31

N2 - Public Key Searchable Encryption (PKSE) has essential applications in cloud storage because it allows users to search over encrypted data. To identify illegal users, many traceable PKSE schemes have been proposed. However, existing schemes cannot trace the keywords that illegal users searched and protect users’ privacy simultaneously. It is challenging to bind users’ identities and keywords while protecting their privacy. Moreover existing traceable PKSE schemes do not consider the unforgeability and immutability of trapdoor query records which leads to frame-up and denial. In this paper, to address these problems, we propose a blockchain-based privacy-preserving PKSE with strong traceability (BP3KSEST) scheme. The main features of our scheme are as follows: (1) authorized users can obtain trapdoors from trapdoor generation center without releasing their identities and keywords; (2) When required, a trusted third party (TTP) can trace both illegal users’ identities and the keywords which they searched; (3) trapdoor query records are unforgeable and immutable. This scheme is appropriate for scenarios where privacy must be addressed, e.g, electronic health record (EHR). We formalize the definition and security model of our BP3KSEST scheme. Furthermore, we present a concrete construction and prove its security. Finally, the implementation is conducted to analyze its efficiency.

AB - Public Key Searchable Encryption (PKSE) has essential applications in cloud storage because it allows users to search over encrypted data. To identify illegal users, many traceable PKSE schemes have been proposed. However, existing schemes cannot trace the keywords that illegal users searched and protect users’ privacy simultaneously. It is challenging to bind users’ identities and keywords while protecting their privacy. Moreover existing traceable PKSE schemes do not consider the unforgeability and immutability of trapdoor query records which leads to frame-up and denial. In this paper, to address these problems, we propose a blockchain-based privacy-preserving PKSE with strong traceability (BP3KSEST) scheme. The main features of our scheme are as follows: (1) authorized users can obtain trapdoors from trapdoor generation center without releasing their identities and keywords; (2) When required, a trusted third party (TTP) can trace both illegal users’ identities and the keywords which they searched; (3) trapdoor query records are unforgeable and immutable. This scheme is appropriate for scenarios where privacy must be addressed, e.g, electronic health record (EHR). We formalize the definition and security model of our BP3KSEST scheme. Furthermore, we present a concrete construction and prove its security. Finally, the implementation is conducted to analyze its efficiency.

U2 - 10.1016/j.sysarc.2024.103264

DO - 10.1016/j.sysarc.2024.103264

M3 - Journal article

VL - 155

JO - Journal of Systems Architecture

JF - Journal of Systems Architecture

SN - 1383-7621

M1 - 103264

ER -