Venkata Bhikshapathi Chenam, Kondepati Dhana Sree, Syed Taqi Ali
{"title":"多接收器无证书公钥可搜索加密:无字段子集连接和不连接","authors":"Venkata Bhikshapathi Chenam, Kondepati Dhana Sree, Syed Taqi Ali","doi":"10.1007/s12083-024-01767-y","DOIUrl":null,"url":null,"abstract":"<p>Cloud-based telemedicine uses powerful data processing technology to improve remote healthcare services. This helps make healthcare more accessible, efficient, and beneficial for both patients and healthcare providers. However, the security and privacy of patients sensitive data, especially when outsourcing to the cloud, remain significant concerns. To address this issue, patient data is stored in encrypted format on the cloud server. A searchable encryption mechanism is employed to enable efficient search on the encrypted data without compromising information confidentiality. While most searchable encryption schemes support conjunctive field keyword search in both single receiver and multi-receiver scenarios, they often result in partial information leakage related to the searched keywords. Additionally, a new scheme based on the Lagrange polynomial concept was developed to support conjunctive field-free search in a single receiver scenario. However, it is unsuitable for multi-receiver scenarios and suffers from certification management challenges. To overcome these limitations, we propose an innovative approach called \"Multi-receiver Certificateless Public-key Searchable Encryption: Field-free Subset Conjunctive and Disjunctive.\" Our scheme is constructed upon reciprocal maps and leverages Lagrange polynomials as a fundamental tool. It offers several advantages, including cipher-index indistinguishability against chosen keyword attacks, utilizing the hardness of the decisional linear Diffie-Hellman assumption. Theoretical and experimental analyses demonstrate that our proposed scheme achieves comparable performance to existing works in terms of computational efficiency and communication overhead.</p>","PeriodicalId":49313,"journal":{"name":"Peer-To-Peer Networking and Applications","volume":"119 1","pages":""},"PeriodicalIF":3.3000,"publicationDate":"2024-07-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"A multi-receiver certificateless public-key searchable encryption: Field-free subset conjunctive and disjunctive\",\"authors\":\"Venkata Bhikshapathi Chenam, Kondepati Dhana Sree, Syed Taqi Ali\",\"doi\":\"10.1007/s12083-024-01767-y\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<p>Cloud-based telemedicine uses powerful data processing technology to improve remote healthcare services. This helps make healthcare more accessible, efficient, and beneficial for both patients and healthcare providers. However, the security and privacy of patients sensitive data, especially when outsourcing to the cloud, remain significant concerns. To address this issue, patient data is stored in encrypted format on the cloud server. A searchable encryption mechanism is employed to enable efficient search on the encrypted data without compromising information confidentiality. While most searchable encryption schemes support conjunctive field keyword search in both single receiver and multi-receiver scenarios, they often result in partial information leakage related to the searched keywords. Additionally, a new scheme based on the Lagrange polynomial concept was developed to support conjunctive field-free search in a single receiver scenario. However, it is unsuitable for multi-receiver scenarios and suffers from certification management challenges. To overcome these limitations, we propose an innovative approach called \\\"Multi-receiver Certificateless Public-key Searchable Encryption: Field-free Subset Conjunctive and Disjunctive.\\\" Our scheme is constructed upon reciprocal maps and leverages Lagrange polynomials as a fundamental tool. It offers several advantages, including cipher-index indistinguishability against chosen keyword attacks, utilizing the hardness of the decisional linear Diffie-Hellman assumption. Theoretical and experimental analyses demonstrate that our proposed scheme achieves comparable performance to existing works in terms of computational efficiency and communication overhead.</p>\",\"PeriodicalId\":49313,\"journal\":{\"name\":\"Peer-To-Peer Networking and Applications\",\"volume\":\"119 1\",\"pages\":\"\"},\"PeriodicalIF\":3.3000,\"publicationDate\":\"2024-07-31\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Peer-To-Peer Networking and Applications\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://doi.org/10.1007/s12083-024-01767-y\",\"RegionNum\":4,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q2\",\"JCRName\":\"COMPUTER SCIENCE, INFORMATION SYSTEMS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Peer-To-Peer Networking and Applications","FirstCategoryId":"94","ListUrlMain":"https://doi.org/10.1007/s12083-024-01767-y","RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q2","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
A multi-receiver certificateless public-key searchable encryption: Field-free subset conjunctive and disjunctive
Cloud-based telemedicine uses powerful data processing technology to improve remote healthcare services. This helps make healthcare more accessible, efficient, and beneficial for both patients and healthcare providers. However, the security and privacy of patients sensitive data, especially when outsourcing to the cloud, remain significant concerns. To address this issue, patient data is stored in encrypted format on the cloud server. A searchable encryption mechanism is employed to enable efficient search on the encrypted data without compromising information confidentiality. While most searchable encryption schemes support conjunctive field keyword search in both single receiver and multi-receiver scenarios, they often result in partial information leakage related to the searched keywords. Additionally, a new scheme based on the Lagrange polynomial concept was developed to support conjunctive field-free search in a single receiver scenario. However, it is unsuitable for multi-receiver scenarios and suffers from certification management challenges. To overcome these limitations, we propose an innovative approach called "Multi-receiver Certificateless Public-key Searchable Encryption: Field-free Subset Conjunctive and Disjunctive." Our scheme is constructed upon reciprocal maps and leverages Lagrange polynomials as a fundamental tool. It offers several advantages, including cipher-index indistinguishability against chosen keyword attacks, utilizing the hardness of the decisional linear Diffie-Hellman assumption. Theoretical and experimental analyses demonstrate that our proposed scheme achieves comparable performance to existing works in terms of computational efficiency and communication overhead.
期刊介绍:
The aim of the Peer-to-Peer Networking and Applications journal is to disseminate state-of-the-art research and development results in this rapidly growing research area, to facilitate the deployment of P2P networking and applications, and to bring together the academic and industry communities, with the goal of fostering interaction to promote further research interests and activities, thus enabling new P2P applications and services. The journal not only addresses research topics related to networking and communications theory, but also considers the standardization, economic, and engineering aspects of P2P technologies, and their impacts on software engineering, computer engineering, networked communication, and security.
The journal serves as a forum for tackling the technical problems arising from both file sharing and media streaming applications. It also includes state-of-the-art technologies in the P2P security domain.
Peer-to-Peer Networking and Applications publishes regular papers, tutorials and review papers, case studies, and correspondence from the research, development, and standardization communities. Papers addressing system, application, and service issues are encouraged.