Privacy leakage of certificateless public key authenticated searchable encryption via frequency analysis: Attacks and revises

被引:2
作者
Cheng, Leixiao [1 ,2 ]
Qin, Jing [1 ]
Meng, Fei [3 ,4 ]
机构
[1] Shandong Univ, Sch Math, Jinan 250100, Peoples R China
[2] Shandong Univ, Sch Cyber Sci & Technol, Qingdao 266237, Peoples R China
[3] Yanqi Lake Beijing Inst Math Sci & Applicat, Beijing, Peoples R China
[4] Tsinghua Univ, Yau Math Sci Ctr, Beijing, Peoples R China
关键词
Certificateless; Authenticated searchable encryption; Keyword guessing attacks; Frequency analysis; Search privacy; KEYWORD SEARCH; INDUSTRIAL INTERNET; SCHEME;
D O I
10.1016/j.csi.2023.103762
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Certificateless public key authenticated searchable encryption (CLPASE) is a versatile asymmetric searchable encryption that enables ciphertext retrieval, resists inside keyword guessing attacks, and avoids both certificate management problem and key escrow problem. However, most existing CLPASE schemes are vulnerable to frequency analysis which can extract keywords from user-generated trapdoors (i.e., search queries) and thus compromise user's search privacy. In this paper, we give a detailed analysis showing that most CLPASE schemes reveal the underlying frequency distribution of the target keywords in the trapdoors searched by users, regardless of whether the trapdoor generation algorithm is deterministic or not. The analysis shows that frequency analysis has become a significant threat to users' search privacy in the CLPASE system. To address this issue, we provide a concrete CLPASE scheme against frequency analysis. We then compare our scheme with previous CLPASE schemes in terms of features and performance evaluation. As a result, our scheme provides higher guarantee for user's search privacy with comparable efficiency.
引用
收藏
页数:9
相关论文
共 42 条
  • [1] Abdalla M, 2005, LECT NOTES COMPUT SC, V3621, P205
  • [2] Al-Riyami SS, 2003, LECT NOTES COMPUT SC, V2894, P452
  • [3] Boneh D, 2004, LECT NOTES COMPUT SC, V3027, P506
  • [4] Byun JW, 2006, LECT NOTES COMPUT SC, V4165, P75
  • [5] A designated cloud server-based multi-user certificateless public key authenticated encryption with conjunctive keyword search against IKGA
    Chenam, Venkata Bhikshapathi
    Ali, Syed Taqi
    [J]. COMPUTER STANDARDS & INTERFACES, 2022, 81
  • [6] A Certificateless Searchable Public Key Encryption Scheme for Multiple Receivers
    Gu, Xiaozhuo
    Wang, Ziliang
    Fu, Maomao
    Ren, Peixin
    [J]. 2021 IEEE INTERNATIONAL CONFERENCE ON WEB SERVICES, ICWS 2021, 2021, : 635 - 641
  • [7] Certificateless Public Key Authenticated Encryption With Keyword Search or Industrial Internet of Things
    He, Debiao
    Ma, Mimi
    Zeadally, Sherali
    Kumar, Neeraj
    Liang, Kaitai
    [J]. IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2018, 14 (08) : 3618 - 3627
  • [8] Secure and Efficient Certificateless Searchable Authenticated Encryption Scheme Without Random Oracle for Industrial Internet of Things
    Hu, Zhenyu
    Deng, Lunzhi
    Wu, Yaying
    Shi, Hongyu
    Gao, Yan
    [J]. IEEE SYSTEMS JOURNAL, 2023, 17 (01): : 1304 - 1315
  • [9] An efficient public-key searchable encryption scheme secure against inside keyword guessing attacks
    Huang, Qiong
    Li, Hongbo
    [J]. INFORMATION SCIENCES, 2017, 403 : 1 - 14
  • [10] Reliable Data Sharing by Certificateless Encryption Supporting Keyword Search Against Vulnerable KGC in Industrial Internet of Things
    Karati, Arijit
    Fan, Chun-, I
    Zhuang, Er-Shuo
    [J]. IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2022, 18 (06) : 3661 - 3669