Trapdoor Privacy in Public Key Encryption With Keyword Search: A Review

被引:3
|
作者
Chan, Koon-Ming [1 ]
Heng, Swee-Huay [1 ]
Yau, Wei-Chuen [2 ]
Tan, Shing-Chiang [1 ]
机构
[1] Multimedia Univ, Fac Informat Sci & Technol, Jalan Ayer Keroh Lama, Melaka 75450, Malaysia
[2] Xiamen Univ Malaysia, Sch Comp & Data Sci, Sepang 43900, Selangor Darul, Malaysia
关键词
Encryption; Public key; Servers; Privacy; Keyword search; Cloud computing; Receivers; PEKS; searchable encryption; trapdoor privacy; keyword privacy; IDENTITY-BASED ENCRYPTION; GUESSING ATTACKS; AUTHENTICATED ENCRYPTION; SECURE; SCHEME; SERVER; EFFICIENT;
D O I
10.1109/ACCESS.2022.3151429
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The public key encryption with keyword search (PEKS) scheme allows searches to be performed over ciphertext by a server in a public-key setting. The PEKS scheme suffers from a major drawback which is keyword guessing attack. A keyword guessing attack (KGA) allows the attacker to successfully guess the correct keyword encrypted in a searchable ciphertext and trapdoor. To overcome this vulnerability, security notions, such as keyword privacy and trapdoor privacy were introduced. Keyword privacy prevents any information leaked from the keyword itself, and similarly trapdoor privacy prevents any information leaked from the trapdoor side. A PEKS scheme that is secure against KGA should satisfy trapdoor privacy. In this paper, we compare various types of PEKS schemes in terms of their underlying computational hardness, system model, search function, security properties of keyword privacy and trapdoor privacy, and security against offline KGA and online KGA. From the comparison analysis, we highlight that trapdoor privacy and keyword privacy are essential for a PEKS scheme to be secure against KGA. Lastly, we draw some potential research directions.
引用
收藏
页码:21584 / 21598
页数:15
相关论文
共 50 条
  • [21] Public key authenticated encryption with keyword search: revisited
    Noroozi, Mahnaz
    Eslami, Ziba
    IET INFORMATION SECURITY, 2019, 13 (04) : 336 - 342
  • [22] Single-Server Public-Key Authenticated Encryption With Keyword Search and Its Application in IIoT
    Zhou, Xiaotong
    He, Debiao
    Ning, Jianting
    Luo, Min
    Huang, Xinyi
    IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, 2024, 11 (01): : 404 - 415
  • [23] The Public Verifiability of Public Key Encryption with Keyword Search
    Zhu, Binrui
    Sun, Jiameng
    Qin, Jing
    Ma, Jixin
    MOBILE NETWORKS AND MANAGEMENT (MONAMI 2017), 2018, 235 : 299 - 312
  • [24] Authorized Keyword Searches on Public Key Encrypted Data With Time Controlled Keyword Privacy
    Xu, Lingling
    Li, Wanhua
    Zhang, Fangguo
    Cheng, Rong
    Tang, Shaohua
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2020, 15 : 2096 - 2109
  • [25] A provably secure certificateless public key encryption with keyword search
    Wu, Tsu-Yang
    Chen, Chien-Ming
    Wang, King-Hang
    Meng, Chao
    Wang, Eric Ke
    JOURNAL OF THE CHINESE INSTITUTE OF ENGINEERS, 2019, 42 (01) : 20 - 28
  • [26] Generic Construction of Dual-Server Public Key Encryption With Keyword Search on Cloud Computing
    Tso, Raylin
    Huang, Kaibin
    Chen, Yu-Chi
    Rahman, Sk Md Mizanur
    Wu, Tsu-Yang
    IEEE ACCESS, 2020, 8 : 152551 - 152564
  • [27] Public key encryption with temporary and fuzzy keyword search
    Vaanchig, Nyamsuren
    Qin, Zhiguang
    MATHEMATICAL BIOSCIENCES AND ENGINEERING, 2019, 16 (05) : 3914 - 3935
  • [28] PUBLIC KEY ENCRYPTION WITH KEYWORD SEARCH BASED ON FACTORING
    Luo, Wenjun
    Tan, Jianming
    2012 IEEE 2ND INTERNATIONAL CONFERENCE ON CLOUD COMPUTING AND INTELLIGENT SYSTEMS (CCIS) VOLS 1-3, 2012, : 1245 - 1247
  • [29] A Blockchain-Based Searchable Public-Key Encryption With Forward and Backward Privacy for Cloud-Assisted Vehicular Social Networks
    Chen, Biwen
    Wu, Libing
    Wang, Huaqun
    Zhou, Lu
    He, Debiao
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2020, 69 (06) : 5813 - 5825
  • [30] Public-Key Encryption with Integrated Keyword Search
    Vishal Saraswat
    Rajeev Anand Sahu
    Gaurav Sharma
    Veronika Kuchta
    Olivier Markowitch
    Journal of Hardware and Systems Security, 2019, 3 (1) : 12 - 25