SPEKS: Secure Server-Designation Public Key Encryption with Keyword Search against Keyword Guessing Attacks

被引:44
作者
Chen, Yu-Chi [1 ]
机构
[1] Acad Sinica, Inst Informat Sci, Taipei, Taiwan
关键词
public key encryption with keyword search; searchable encryption; server designation; trapdoor; security; SCHEMES;
D O I
10.1093/comjnl/bxu013
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Public key encryption with keyword search (PEKS) is a system for realizing keyword search over encrypted data, but communication must rely on a secure channel. In PEKS, a sender would like to share data with a receiver via a storage server. For security and privacy purpose, he must upload the encrypted data to the server, and further the server can search encrypted data (sent by the sender) by using a keyword trapdoor (given by the receiver). In the literature, a new system, server-designation public key encryption with keyword search (dPEKS), is introduced to eliminate the assumption of the secure channel in PEKS. The security models are defined for trapdoor security. However, dPEKS suffers from the on-line keyword guessing attack. In this paper, we first analyze this weakness of dPEKS and enhance the security models with practical adversaries. Secondly, owing to the shown weakness, we consider and define 'original ciphertext indistinguishability' regarding the task after the server's search. Finally, we present a new framework of secure server-designation public key encryption with keyword search (SPEKS), and analyze its security.
引用
收藏
页码:922 / 933
页数:12
相关论文
共 23 条
[1]   Searchable encryption revisited: Consistency properties, relation to anonymous IBE, and extensions [J].
Abdalla, Michel ;
Bellare, Mihir ;
Catalano, Dario ;
Kiltz, Eike ;
Kohno, Tadayoshi ;
Lange, Tanja ;
Malone-Lee, John ;
Neven, Gregory ;
Paillier, Pascal ;
Shi, Haixia .
JOURNAL OF CRYPTOLOGY, 2008, 21 (03) :350-391
[2]  
Baek J, 2008, LECT NOTES COMPUT SC, V5072, P1249, DOI 10.1007/978-3-540-69839-5_96
[3]  
Boneh D, 2004, LECT NOTES COMPUT SC, V3027, P506
[4]   Short signatures from the Weil pairing [J].
Boneh, D ;
Lynn, B ;
Shacham, H .
JOURNAL OF CRYPTOLOGY, 2004, 17 (04) :297-319
[5]  
Boyen X, 2006, LECT NOTES COMPUT SC, V4117, P290
[6]  
Byun JW, 2006, LECT NOTES COMPUT SC, V4165, P75
[7]   On a security model of conjunctive keyword search over encrypted relational database [J].
Byun, Jin Wook ;
Lee, Dong Hoon .
JOURNAL OF SYSTEMS AND SOFTWARE, 2011, 84 (08) :1364-1372
[8]   Improved Anonymous Multi-receiver Identity-Based Encryption [J].
Chien, Hung-Yu .
COMPUTER JOURNAL, 2012, 55 (04) :439-446
[9]   Anonymous Multireceiver Identity-Based Encryption [J].
Fan, Chun-I ;
Huang, Ling-Ying ;
Ho, Pei-Hsiu .
IEEE TRANSACTIONS ON COMPUTERS, 2010, 59 (09) :1239-1249
[10]   Secure conjunctive keyword search over encrypted data [J].
Golle, P ;
Staddon, J ;
Waters, B .
APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, PROCEEDINGS, 2004, 3089 :31-45