Keyword guessing attacks on a public key encryption with keyword search scheme without random oracle and its improvement

被引:45
|
作者
Lu, Yang [1 ]
Wang, Gang [2 ]
Li, Jiguo [3 ,4 ]
机构
[1] Nanjing Normal Univ, Sch Comp Sci & Technol, Nanjing, Jiangsu, Peoples R China
[2] Hohai Univ, Coll Comp & Informat, Nanjing, Jiangsu, Peoples R China
[3] Fujian Normal Univ, Coll Math & Informat, Fuzhou, Fujian, Peoples R China
[4] Fujian Prov Key Lab Network Secur & Cryptol, Fuzhou, Fujian, Peoples R China
基金
中国国家自然科学基金;
关键词
Public key encryption with keyword search; Keyword guessing attack; Standard model; Outsider attacker; Malicious insider server; SECURE; EFFICIENT; SERVER;
D O I
10.1016/j.ins.2018.12.004
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Public key encryption with keyword search (PEKS) is a useful paradigm that enables a user to delegate searching capabilities on publicly encrypted data to an untrusted third party without revealing the data contents. In 2013, Fang et al. proposed a secure channel free PEKS (SCF-PEKS) scheme without random oracle and asserted that their scheme can withstand the keyword guessing (KG) attacks by outsider attackers. Later, Shao and Yang presented an improvement of Fang et al.'s SCF-PEKS scheme so as to obtain the security against KG attacks by malicious insider servers. In this paper, we demonstrate that both Fang et al.'s SCF-PEKS scheme and the improved scheme proposed by Shao and Yang fail in achieving their security goal. Our cryptanalysis shows that the former is vulnerable to the KG attacks by outsider attackers while the latter is vulnerable to the KG attacks by malicious insider servers. To overcome the security weaknesses in these two schemes, we present a new improvement of Fang et al.'s SCF-PEKS scheme. The analysis indicates that the improved scheme provides resistance against KG attacks by either outsider attackers or malicious insider servers. (C) 2018 Elsevier Inc. All rights reserved.
引用
收藏
页码:270 / 276
页数:7
相关论文
共 50 条
  • [31] Efficient public-key searchable encryption against inside keyword guessing attacks for cloud storage
    Wu, Axin
    Li, Fagen
    Xin, Xiangjun
    Zhang, Yinghui
    Zhu, Jianhao
    JOURNAL OF SYSTEMS ARCHITECTURE, 2024, 149
  • [32] Public key authenticated encryption with keyword search: revisited
    Noroozi, Mahnaz
    Eslami, Ziba
    IET INFORMATION SECURITY, 2019, 13 (04) : 336 - 342
  • [33] Public Key Encryption with Hierarchical Authorized Keyword Search
    Liu, Zi-Yuan
    Chien, Chu-Chieh
    Tseng, Yi-Fan
    Tso, Raylin
    Mambo, Masahiro
    INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2022, 2023, 13849 : 147 - 170
  • [34] On Improving the Performance of Public Key Encryption with Keyword Search
    Long, Bin
    Gu, Dawu
    Ding, Ning
    Lu, Haining
    2012 INTERNATIONAL CONFERENCE ON CLOUD COMPUTING AND SERVICE COMPUTING (CSC), 2012, : 143 - 147
  • [35] Public-Key Encryption with Integrated Keyword Search
    Vishal Saraswat
    Rajeev Anand Sahu
    Gaurav Sharma
    Veronika Kuchta
    Olivier Markowitch
    Journal of Hardware and Systems Security, 2019, 3 (1) : 12 - 25
  • [36] Efficient public key encryption with revocable keyword search
    Yu, Yong
    Ni, Jianbing
    Yang, Haomiao
    Mu, Yi
    Susilo, Willy
    SECURITY AND COMMUNICATION NETWORKS, 2014, 7 (02) : 466 - 472
  • [37] On the Security of a Certificateless Public Key Encryption with Keyword Search
    Wu, Tsu-Yang
    Meng, Chao
    Chen, Chien-Ming
    Wang, King-Hang
    Pan, Jeng-Shyang
    ADVANCES IN INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING, PT I, 2018, 81 : 191 - 197
  • [38] Online/Offline Attribute-Based Encryption with Keyword Search against Keyword Guessing Attack
    Su, Hang
    Zhu, Zhiqiang
    Sun, Lei
    PROCEEDINGS OF 2017 3RD IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATIONS (ICCC), 2017, : 1487 - 1492
  • [39] StopGuess: A framework for public-key authenticated encryption with keyword search
    Xiang, Tao
    Wang, Zhongming
    Chen, Biwen
    Li, Xiaoguo
    Wang, Peng
    Chen, Fei
    COMPUTER STANDARDS & INTERFACES, 2024, 88
  • [40] Proxy Re-Encryption Conjunctive Keyword Search against Keyword Guessing Attack
    Yang, Yang
    Ma, Maode
    Lin, Bogang
    2013 COMPUTING, COMMUNICATIONS AND IT APPLICATIONS CONFERENCE (COMCOMAP), 2013, : 125 - 130