Public key authenticated searchable encryption against frequency analysis attacks

被引:5
作者
Cheng, Leixiao [1 ,2 ]
Meng, Fei [3 ,4 ]
机构
[1] Shandong Univ, Sch Math, Jinan 250100, Peoples R China
[2] Shandong Univ, Sch Cyber Sci & Technol, Qingdao, Peoples R China
[3] Yanqi Lake Beijing Inst Math Sci & Applicat, Beijing, Peoples R China
[4] Tsinghua Univ, Yau Math Sci Ctr, Beijing, Peoples R China
关键词
PEKS; PAEKS; Keyword guessing attacks; Frequency analysis attacks; KEYWORD GUESSING ATTACKS; SECURITY; SCHEME;
D O I
10.1016/j.ins.2023.119060
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
To retrieve data in form of encryption, Boneh et al. proposed a primitive called the public key encryption with keyword search (PEKS). Unfortunately, PEKS is inherently vulnerable to the keyword guessing attack (KGA). To resist such an attack, Huang et al. introduced an authenticated version of PEKS (i.e., PAEKS), in which the sender not only encrypts the keyword, but also uses his/her secret key to authenticate it. Since then, many PAEKS schemes have emerged to improve the security model of the PAEKS system. However, none of these PAEKS schemes consider frequency analysis attacks (FAA). This attack works by tabulating the frequency distribution of trapdoors generated by user when searching, i.e., placing trapdoors embedded with the same keyword in the same category and recording the number of trapdoors in each category. These frequencies are then compared with the priori knowledge of the frequency of keyword searched by user to extract the keyword embedded in the trapdoor, thereby corrupting the user's search privacy.This work formally analyzes how frequency analysis attacks lead to the leakage of keyword information of the trapdoor in the PAEKS system. Then, to resist against this attack, we propose the first PAEKS scheme with frequency analysis attack resistance to protect the user's search privacy. In order to simplify the management of the sender/receiver's public keys, we further propose our second PAEKS scheme based on the first scheme. Finally, we show that both of these two schemes are proven secure under static assumptions.
引用
收藏
页数:12
相关论文
共 25 条
  • [1] Abdalla M, 2005, LECT NOTES COMPUT SC, V3621, P205
  • [2] Al-Kadit I.A., 1992, Cryptologia, V16, P97, DOI DOI 10.1080/0161-119291866801
  • [3] Boneh D, 2004, LECT NOTES COMPUT SC, V3027, P506
  • [4] Boneh D, 2007, LECT NOTES COMPUT SC, V4392, P535
  • [5] Byun JW, 2006, LECT NOTES COMPUT SC, V4165, P75
  • [6] Dual-Server Public-Key Encryption With Keyword Search for Secure Cloud Storage
    Chen, Rongmao
    Mu, Yi
    Yang, Guomin
    Guo, Fuchun
    Wang, Xiaofen
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2016, 11 (04) : 789 - 798
  • [7] Fuhr T, 2007, LECT NOTES COMPUT SC, V4784, P228
  • [8] Secure conjunctive keyword search over encrypted data
    Golle, P
    Staddon, J
    Waters, B
    [J]. APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, PROCEEDINGS, 2004, 3089 : 31 - 45
  • [9] Certificateless Public Key Authenticated Encryption With Keyword Search or Industrial Internet of Things
    He, Debiao
    Ma, Mimi
    Zeadally, Sherali
    Kumar, Neeraj
    Liang, Kaitai
    [J]. IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2018, 14 (08) : 3618 - 3627
  • [10] An efficient public-key searchable encryption scheme secure against inside keyword guessing attacks
    Huang, Qiong
    Li, Hongbo
    [J]. INFORMATION SCIENCES, 2017, 403 : 1 - 14