Cryptanalysis of Keyword Confidentiality in a Searchable Public-Key Encryption Scheme Against Malicious Server

被引:0
作者
Zhang, Nan [1 ,2 ]
Qin, Baodong [1 ,2 ]
Zheng, Dong [1 ,2 ]
机构
[1] Xian Univ Posts & Telecommun, Xian 710121, Peoples R China
[2] Natl Engn Res Ctr Secured Wireless, Xian, Peoples R China
基金
中国国家自然科学基金;
关键词
AUTHENTICATED ENCRYPTION; GUESSING ATTACKS; SECURE;
D O I
10.1049/ise2/2464518
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Public-key authenticated encryption with keyword search (PAEKS) is a novel cryptographic primitive to resist against keyword-guessing attacks (KGAs) and preserve the privacy of keywords in both ciphertexts and trapdoors. Recently, a designated-server PAEKS (dPAEKS) scheme was proposed to withstand KGAs. The scheme was claimed to satisfy both multi-ciphertext indistinguishability (MCI) and multi-trapdoor privacy (MTP). However, our cryptanalysis demonstrates that it is insecure against KGAs, where a malicious server (inside attacker) can obtain the information of the keywords embedded in the ciphertext and the trapdoor. As a result, both the MCI and MTP of the scheme are broken. In addition, the paper also shows that it is possible to break the security of MTP, even for an outside attacker. Finally, we also provide a method to fix these security flaws.
引用
收藏
页数:9
相关论文
共 50 条
  • [41] Efficient and verifiable keyword search over public-key ciphertexts based on blockchain
    Han, Min
    Xu, Peng
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2025, 89
  • [42] Efficient public key encryption with revocable keyword search
    Yu, Yong
    Ni, Jianbing
    Yang, Haomiao
    Mu, Yi
    Susilo, Willy
    SECURITY AND COMMUNICATION NETWORKS, 2014, 7 (02) : 466 - 472
  • [43] Public Key Encryption with Keyword Search in Cloud: A Survey
    Zhou, Yunhong
    Li, Na
    Tian, Yanmei
    An, Dezhi
    Wang, Licheng
    ENTROPY, 2020, 22 (04)
  • [44] Public key authenticated encryption with keyword search: revisited
    Noroozi, Mahnaz
    Eslami, Ziba
    IET INFORMATION SECURITY, 2019, 13 (04) : 336 - 342
  • [45] RS-PKE: Ranked Searchable Public-Key Encryption for Cloud-Assisted Lightweight Platforms
    Mouri, Israt Jahan
    Ridowan, Muhammad
    Adnan, Muhammad Abdullah
    CODASPY'22: PROCEEDINGS OF THE TWELVETH ACM CONFERENCE ON DATA AND APPLICATION SECURITY AND PRIVACY, 2022, : 324 - 335
  • [46] Public-Key Encryption Resilient Against Linear Related-Key Attacks Revisited
    Cui, Hui
    Mu, Yi
    Au, Man Ho
    2014 IEEE 13TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM), 2014, : 268 - 275
  • [47] Comments on a chaos-based public key encryption with keyword search scheme
    Noroozi, Mahnaz
    Eslami, Ziba
    Pakniat, Nasrollah
    NONLINEAR DYNAMICS, 2018, 94 (02) : 1127 - 1132
  • [48] Comments on Islam Et Al.'s Certificateless Designated Server Based Public Key Encryption with Keyword Search Scheme
    Wu, Tsu-Yang
    Meng, Chao
    Wang, King-Hang
    Chen, Chien-Ming
    Pan, Jeng-Shyang
    GENETIC AND EVOLUTIONARY COMPUTING, 2018, 579 : 199 - 205
  • [49] VCLPKES: Verifiable Certificateless Public Key Searchable Encryption Scheme for Industrial Internet of Things
    Zhang, Yulei
    Liu, Xiangzhen
    Lang, Xiaoli
    Zhang, Yongjie
    Wang, Caifen
    IEEE ACCESS, 2020, 8 (08): : 20849 - 20861
  • [50] A designated cloud server-based multi-user certificateless public key authenticated encryption with conjunctive keyword search against IKGA
    Chenam, Venkata Bhikshapathi
    Ali, Syed Taqi
    COMPUTER STANDARDS & INTERFACES, 2022, 81