Trapdoor Privacy in Public Key Encryption With Keyword Search: A Review

被引:3
|
作者
Chan, Koon-Ming [1 ]
Heng, Swee-Huay [1 ]
Yau, Wei-Chuen [2 ]
Tan, Shing-Chiang [1 ]
机构
[1] Multimedia Univ, Fac Informat Sci & Technol, Jalan Ayer Keroh Lama, Melaka 75450, Malaysia
[2] Xiamen Univ Malaysia, Sch Comp & Data Sci, Sepang 43900, Selangor Darul, Malaysia
关键词
Encryption; Public key; Servers; Privacy; Keyword search; Cloud computing; Receivers; PEKS; searchable encryption; trapdoor privacy; keyword privacy; IDENTITY-BASED ENCRYPTION; GUESSING ATTACKS; AUTHENTICATED ENCRYPTION; SECURE; SCHEME; SERVER; EFFICIENT;
D O I
10.1109/ACCESS.2022.3151429
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The public key encryption with keyword search (PEKS) scheme allows searches to be performed over ciphertext by a server in a public-key setting. The PEKS scheme suffers from a major drawback which is keyword guessing attack. A keyword guessing attack (KGA) allows the attacker to successfully guess the correct keyword encrypted in a searchable ciphertext and trapdoor. To overcome this vulnerability, security notions, such as keyword privacy and trapdoor privacy were introduced. Keyword privacy prevents any information leaked from the keyword itself, and similarly trapdoor privacy prevents any information leaked from the trapdoor side. A PEKS scheme that is secure against KGA should satisfy trapdoor privacy. In this paper, we compare various types of PEKS schemes in terms of their underlying computational hardness, system model, search function, security properties of keyword privacy and trapdoor privacy, and security against offline KGA and online KGA. From the comparison analysis, we highlight that trapdoor privacy and keyword privacy are essential for a PEKS scheme to be secure against KGA. Lastly, we draw some potential research directions.
引用
收藏
页码:21584 / 21598
页数:15
相关论文
共 50 条
  • [31] On the Security of a Certificateless Public Key Encryption with Keyword Search
    Wu, Tsu-Yang
    Meng, Chao
    Chen, Chien-Ming
    Wang, King-Hang
    Pan, Jeng-Shyang
    ADVANCES IN INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING, PT I, 2018, 81 : 191 - 197
  • [32] Public-key authenticated encryption with keyword search revisited: Security model and constructions
    Qin, Baodong
    Chen, Yu
    Huang, Qiong
    Liu, Ximeng
    Zheng, Dong
    INFORMATION SCIENCES, 2020, 516 : 515 - 528
  • [33] Public-key encryption with bidirectional keyword search and its application to encrypted emails
    Zhang, Wenzheng
    Qin, Baodong
    Dong, Xinfeng
    Tian, Aikui
    COMPUTER STANDARDS & INTERFACES, 2021, 78
  • [34] Identity-Based Group Encryption With Keyword Search Against Keyword Guessing Attack
    Wang, Wei
    Liu, Dongli
    Zheng, Zilin
    Xu, Peng
    Yang, Laurence Tianruo
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2024, 19 : 8023 - 8036
  • [35] Key-Policy Attribute-Based Encryption With Keyword Search in Virtualized Environments
    Yu, Yong
    Shi, Junbin
    Li, Huilin
    Li, Yannan
    Du, Xiaojiang
    Guizani, Mohsen
    IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2020, 38 (06) : 1242 - 1251
  • [36] Public-Key Inverted-Index Keyword Search With Designated Tester and Multiuser Key Decryption in IoT
    Gao, Nan
    Fan, Kai
    Wang, Haoyang
    Zhang, Kuan
    Li, Hui
    Yang, Yintang
    IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (01) : 1065 - 1079
  • [37] Privacy-Preserving and Pairing-Free Multirecipient Certificateless Encryption With Keyword Search for Cloud-Assisted IIoT
    Yang, Lu
    Li, Jiguo
    Zhang, Yichen
    IEEE INTERNET OF THINGS JOURNAL, 2020, 7 (04): : 2553 - 2562
  • [38] Certificateless Public Key Encryption with Keyword Search
    Peng Yanguo
    Cui Jiangtao
    Peng Changgen
    Ying Zuobin
    CHINA COMMUNICATIONS, 2014, 11 (11) : 100 - 113
  • [39] Certificateless Searchable Public Key Encryption With Trapdoor Indistinguishability for IoV
    Ma, Mimi
    Chen, Biwen
    Tang, Dianhua
    Deng, Miaolei
    Xiang, Tao
    He, Debiao
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2025, 74 (03) : 5085 - 5096
  • [40] Public Key Encryption with Wildcards Keyword Search
    Wang, Zhao-li
    Han, Jin-li
    Wang, Mei-juan
    Shi, Ya-qing
    Dong, Hui
    2018 EIGHTH INTERNATIONAL CONFERENCE ON INSTRUMENTATION AND MEASUREMENT, COMPUTER, COMMUNICATION AND CONTROL (IMCCC 2018), 2018, : 538 - 541