Trapdoor Privacy in Public Key Encryption With Keyword Search: A Review

被引:3
|
作者
Chan, Koon-Ming [1 ]
Heng, Swee-Huay [1 ]
Yau, Wei-Chuen [2 ]
Tan, Shing-Chiang [1 ]
机构
[1] Multimedia Univ, Fac Informat Sci & Technol, Jalan Ayer Keroh Lama, Melaka 75450, Malaysia
[2] Xiamen Univ Malaysia, Sch Comp & Data Sci, Sepang 43900, Selangor Darul, Malaysia
关键词
Encryption; Public key; Servers; Privacy; Keyword search; Cloud computing; Receivers; PEKS; searchable encryption; trapdoor privacy; keyword privacy; IDENTITY-BASED ENCRYPTION; GUESSING ATTACKS; AUTHENTICATED ENCRYPTION; SECURE; SCHEME; SERVER; EFFICIENT;
D O I
10.1109/ACCESS.2022.3151429
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The public key encryption with keyword search (PEKS) scheme allows searches to be performed over ciphertext by a server in a public-key setting. The PEKS scheme suffers from a major drawback which is keyword guessing attack. A keyword guessing attack (KGA) allows the attacker to successfully guess the correct keyword encrypted in a searchable ciphertext and trapdoor. To overcome this vulnerability, security notions, such as keyword privacy and trapdoor privacy were introduced. Keyword privacy prevents any information leaked from the keyword itself, and similarly trapdoor privacy prevents any information leaked from the trapdoor side. A PEKS scheme that is secure against KGA should satisfy trapdoor privacy. In this paper, we compare various types of PEKS schemes in terms of their underlying computational hardness, system model, search function, security properties of keyword privacy and trapdoor privacy, and security against offline KGA and online KGA. From the comparison analysis, we highlight that trapdoor privacy and keyword privacy are essential for a PEKS scheme to be secure against KGA. Lastly, we draw some potential research directions.
引用
收藏
页码:21584 / 21598
页数:15
相关论文
共 50 条
  • [1] An Efficient and Secure Public Key Authenticated Encryption With Keyword Search in the Logarithmic Time
    Han, Lidong
    Guo, Junling
    Yang, Guang
    Xie, Qi
    Tian, Chengliang
    IEEE ACCESS, 2021, 9 : 151245 - 151253
  • [2] Public Key Encryption with Keyword Search in Cloud: A Survey
    Zhou, Yunhong
    Li, Na
    Tian, Yanmei
    An, Dezhi
    Wang, Licheng
    ENTROPY, 2020, 22 (04)
  • [3] Lightweight Multi-User Public-Key Authenticated Encryption With Keyword Search
    Xu, Yongliang
    Cheng, Hang
    Li, Jiguo
    Liu, Ximeng
    Zhang, Xinpeng
    Wang, Meiqing
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2025, 20 : 3234 - 3246
  • [4] Public-Key Authenticated Encryption With Keyword Search Supporting Constant Trapdoor Generation and Fast Search
    Li, Hongbo
    Huang, Qiong
    Huang, Jianye
    Susilo, Willy
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2023, 18 : 396 - 410
  • [5] A Survey on Public Key Encryption with Keyword Search: Taxonomy and Methods
    Noorallahzade, M. H.
    Alimoradi, R.
    Gholami, A.
    INTERNATIONAL JOURNAL OF MATHEMATICS AND MATHEMATICAL SCIENCES, 2022, 2022
  • [6] A Survey of Public-Key Encryption With Search Functionality for Cloud-Assisted IoT
    Xiong, Hu
    Yao, Tianang
    Wang, Hanxiao
    Feng, Jun
    Yu, Shui
    IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (01) : 401 - 418
  • [7] Data Secure De-Duplication and Recovery Based on Public Key Encryption With Keyword Search
    Li, Le
    Zheng, Dong
    Zhang, Haoyu
    Qin, Baodong
    IEEE ACCESS, 2023, 11 : 28688 - 28698
  • [8] Generic Construction: Cryptographic Reverse Firewalls for Public Key Encryption With Keyword Search in Cloud Storage
    Ming, Yang
    Liu, Hang
    Wang, Chenhao
    Zhao, Yi
    IEEE TRANSACTIONS ON CLOUD COMPUTING, 2024, 12 (02) : 405 - 418
  • [9] Lightweight Public Key Authenticated Encryption With Keyword Search Against Adaptively-Chosen-Targets Adversaries for Mobile Devices
    Lu, Yang
    Li, Jiguo
    IEEE TRANSACTIONS ON MOBILE COMPUTING, 2022, 21 (12) : 4397 - 4409
  • [10] Efficient public key encryption with revocable keyword search
    Yu, Yong
    Ni, Jianbing
    Yang, Haomiao
    Mu, Yi
    Susilo, Willy
    SECURITY AND COMMUNICATION NETWORKS, 2014, 7 (02) : 466 - 472