Public key encryption with keyword search secure against keyword guessing attacks without random oracle

被引:174
|
作者
Fang, Liming [1 ]
Susilo, Willy [2 ]
Ge, Chunpeng [1 ]
Wang, Jiandong [1 ]
机构
[1] Nanjing Univ Aeronaut & Astronaut, Coll Comp Sci & Technol, Nanjing, Jiangsu, Peoples R China
[2] Univ Wollongong, CCISR, Sch Comp Sci & Software Engn, Wollongong, NSW 2522, Australia
基金
中国国家自然科学基金;
关键词
Public key encryption with keyword search; Keyword guessing attack; Without random oracle; SCHEME; SUBSET; IBE;
D O I
10.1016/j.ins.2013.03.008
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The notion of public key encryption with keyword search (PEKS) was put forth by Boneh et al. to enable a server to search from a collection of encrypted emails given a "trapdoor" (i.e., an encrypted keyword) provided by the receiver. The nice property in this scheme allows the server to search for a keyword, given the trapdoor. Hence, the verifier can merely use an untrusted server, which makes this notion very practical. Following Boneh et al.'s work, there have been subsequent works that have been proposed to enhance this notion. Two important notions include the so-called keyword guessing attack and secure channel free, proposed by Byun et al. and Baek et al., respectively. The former realizes the fact that in practice, the space of the keywords used is very limited, while the latter considers the removal of secure channel between the receiver and the server to make PEKS practical. Unfortunately, the existing construction of PEKS secure against keyword guessing attack is only secure under the random oracle model, which does not reflect its security in the real world. Furthermore, there is no complete definition that captures secure channel free PEKS schemes that are secure against chosen keyword attack, chosen ciphertext attack, and against keyword guessing attacks, even though these notions seem to be the most practical application of PEKS primitives. In this paper, we make the following contributions. First, we define the strongest model of PEKS which is secure channel free and secure against chosen keyword attack, chosen ciphertext attack, and keyword guessing attack. In particular, we present two important security notions namely IND-SCF-CKCA and IND-KGA. The former is to capture an inside adversary, while the latter is to capture an outside adversary. Intuitively, it should be clear that IND-SCF-CKCA captures a more stringent attack compared to IND-KGA. Second, we present a secure channel free PEKS scheme secure without random oracle under the well known assumptions, namely DLP, DBDH, SXDH and truncated q-ABDHE assumption. Our contributions fill the gap in the literature andf hence, making the notion of PEKS very practical. We shall highlight that our scheme is IND-SCF-CKCA secure. (C) 2013 Elsevier Inc. All rights reserved.
引用
收藏
页码:221 / 241
页数:21
相关论文
共 50 条
  • [31] Provably secure public-key encryption with conjunctive and subset keyword search
    Farras, Oriol
    Ribes-Gonzalez, Jordi
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2019, 18 (05) : 533 - 548
  • [32] Keyword Search Encryption Scheme Resistant Against Keyword-Guessing Attack by the Untrusted Server
    王智弘
    涂泰源
    Journal of Shanghai Jiaotong University(Science), 2014, 19 (04) : 440 - 442
  • [33] Online/Offline Attribute-Based Encryption with Keyword Search against Keyword Guessing Attack
    Su, Hang
    Zhu, Zhiqiang
    Sun, Lei
    PROCEEDINGS OF 2017 3RD IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATIONS (ICCC), 2017, : 1487 - 1492
  • [34] Forward Secure Public Key Encryption with Keyword Search for Outsourced Cloud Storage
    Zeng, Ming
    Qian, Haifeng
    Chen, Jie
    Zhang, Kai
    IEEE TRANSACTIONS ON CLOUD COMPUTING, 2022, 10 (01) : 426 - 438
  • [35] Generic Construction of Forward Secure Public Key Authenticated Encryption with Keyword Search
    Emura, Keita
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, ACNS 2024, PT I, 2024, 14583 : 237 - 256
  • [36] Keyword search encryption scheme resistant against keyword-guessing attack by the untrusted server
    Wang C.-H.
    Tu T.-Y.
    Journal of Shanghai Jiaotong University (Science), 2014, 19 (04) : 440 - 442
  • [37] Constructing PEKS schemes secure against keyword guessing attacks is possible?
    Jeong, Ik Rae
    Kwon, Jeong Ok
    Hong, Dowon
    Lee, Dong Hoon
    COMPUTER COMMUNICATIONS, 2009, 32 (02) : 394 - 396
  • [38] Public-Key Encryption With Keyword Search via Obfuscation
    Hu, Chengyu
    Liu, Pengtao
    Yang, Rupeng
    Xu, Yan
    IEEE ACCESS, 2019, 7 : 37394 - 37405
  • [39] Server-Aided Public Key Encryption With Keyword Search
    Chen, Rongmao
    Mu, Yi
    Yang, Guomin
    Guo, Fuchun
    Huang, Xinyi
    Wang, Xiaofen
    Wang, Yongjun
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2016, 11 (12) : 2833 - 2842
  • [40] Public Key Encryption with Multi-keyword Search
    Hu, Chengyu
    He, Peng
    Liu, Pengtao
    NETWORK COMPUTING AND INFORMATION SECURITY, 2012, 345 : 568 - +