Public key encryption with keyword search secure against keyword guessing attacks without random oracle

被引:174
|
作者
Fang, Liming [1 ]
Susilo, Willy [2 ]
Ge, Chunpeng [1 ]
Wang, Jiandong [1 ]
机构
[1] Nanjing Univ Aeronaut & Astronaut, Coll Comp Sci & Technol, Nanjing, Jiangsu, Peoples R China
[2] Univ Wollongong, CCISR, Sch Comp Sci & Software Engn, Wollongong, NSW 2522, Australia
基金
中国国家自然科学基金;
关键词
Public key encryption with keyword search; Keyword guessing attack; Without random oracle; SCHEME; SUBSET; IBE;
D O I
10.1016/j.ins.2013.03.008
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The notion of public key encryption with keyword search (PEKS) was put forth by Boneh et al. to enable a server to search from a collection of encrypted emails given a "trapdoor" (i.e., an encrypted keyword) provided by the receiver. The nice property in this scheme allows the server to search for a keyword, given the trapdoor. Hence, the verifier can merely use an untrusted server, which makes this notion very practical. Following Boneh et al.'s work, there have been subsequent works that have been proposed to enhance this notion. Two important notions include the so-called keyword guessing attack and secure channel free, proposed by Byun et al. and Baek et al., respectively. The former realizes the fact that in practice, the space of the keywords used is very limited, while the latter considers the removal of secure channel between the receiver and the server to make PEKS practical. Unfortunately, the existing construction of PEKS secure against keyword guessing attack is only secure under the random oracle model, which does not reflect its security in the real world. Furthermore, there is no complete definition that captures secure channel free PEKS schemes that are secure against chosen keyword attack, chosen ciphertext attack, and against keyword guessing attacks, even though these notions seem to be the most practical application of PEKS primitives. In this paper, we make the following contributions. First, we define the strongest model of PEKS which is secure channel free and secure against chosen keyword attack, chosen ciphertext attack, and keyword guessing attack. In particular, we present two important security notions namely IND-SCF-CKCA and IND-KGA. The former is to capture an inside adversary, while the latter is to capture an outside adversary. Intuitively, it should be clear that IND-SCF-CKCA captures a more stringent attack compared to IND-KGA. Second, we present a secure channel free PEKS scheme secure without random oracle under the well known assumptions, namely DLP, DBDH, SXDH and truncated q-ABDHE assumption. Our contributions fill the gap in the literature andf hence, making the notion of PEKS very practical. We shall highlight that our scheme is IND-SCF-CKCA secure. (C) 2013 Elsevier Inc. All rights reserved.
引用
收藏
页码:221 / 241
页数:21
相关论文
共 50 条
  • [41] Public key encryption with temporary and fuzzy keyword search
    Vaanchig, Nyamsuren
    Qin, Zhiguang
    MATHEMATICAL BIOSCIENCES AND ENGINEERING, 2019, 16 (05) : 3914 - 3935
  • [42] Public Key Encryption with Keyword Search in Cloud: A Survey
    Zhou, Yunhong
    Li, Na
    Tian, Yanmei
    An, Dezhi
    Wang, Licheng
    ENTROPY, 2020, 22 (04)
  • [43] Public key authenticated encryption with keyword search: revisited
    Noroozi, Mahnaz
    Eslami, Ziba
    IET INFORMATION SECURITY, 2019, 13 (04) : 336 - 342
  • [44] Public Key Encryption with Hierarchical Authorized Keyword Search
    Liu, Zi-Yuan
    Chien, Chu-Chieh
    Tseng, Yi-Fan
    Tso, Raylin
    Mambo, Masahiro
    INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2022, 2023, 13849 : 147 - 170
  • [45] On Improving the Performance of Public Key Encryption with Keyword Search
    Long, Bin
    Gu, Dawu
    Ding, Ning
    Lu, Haining
    2012 INTERNATIONAL CONFERENCE ON CLOUD COMPUTING AND SERVICE COMPUTING (CSC), 2012, : 143 - 147
  • [46] Secure Channel Free Certificate-Based Searchable Encryption Withstanding Outside and Inside Keyword Guessing Attacks
    Lu, Yang
    Li, Jiguo
    Zhang, Yichen
    IEEE TRANSACTIONS ON SERVICES COMPUTING, 2021, 14 (06) : 2041 - 2054
  • [47] A New Framework of IND-CCA Secure Public Key Encryption with Keyword Search
    Ma, Sha
    Huang, Qiong
    COMPUTER JOURNAL, 2020, 63 (12) : 1849 - 1858
  • [48] Provably secure public key encryption with keyword search for data outsourcing in cloud environments
    Ghosh, Sudeep
    Islam, S. K. Hafizul
    Bisht, Abhishek
    Das, Ashok Kumar
    JOURNAL OF SYSTEMS ARCHITECTURE, 2023, 139
  • [49] Chosen-Ciphertext Attack Secure Public-Key Encryption with Keyword Search
    Rhee, Hyun Sook
    CMC-COMPUTERS MATERIALS & CONTINUA, 2022, 73 (01): : 69 - 85
  • [50] Forward Secure Public Key Encryption with Keyword Search for Cloud-assisted IoT
    Kim, Hyeongseob
    Hahn, Changhee
    Hur, Junbeom
    2020 IEEE 13TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING (CLOUD 2020), 2020, : 549 - 556