Constructing Certificateless Encryption with Keyword Search against Outside and Inside Keyword Guessing Attacks

被引:0
作者
Lu, Yang [1 ]
Li, Jiguo [2 ,3 ]
机构
[1] Nanjing Normal Univ, Sch Comp Sci & Technol, Nanjing 210023, Jiangsu, Peoples R China
[2] Fujian Normal Univ, Coll Math & Informat, Fuzhou 350117, Fujian, Peoples R China
[3] Fujian Prov Key Lab Network Secur & Cryptol, Fuzhou 350007, Fujian, Peoples R China
基金
中国国家自然科学基金;
关键词
searchable public key encryption; certificateless encryption with keyword search; inside keyword guessing attack; outside keyword guessing attack; random oracle model; PUBLIC-KEY ENCRYPTION; SECURE; SCHEME; SERVER; ORACLE;
D O I
暂无
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Searchable public key encryption is a useful cryptographic paradigm that enables an untrustworthy server to retrieve the encrypted data without revealing the contents of the data. It offers a promising solution to encrypted data retrieval in cryptographic cloud storage. Certificateless public key cryptography (CLPKC) is a novel cryptographic primitive that has many merits. It overcomes the key escrow problem in identity-based cryptography (IBC) and the cumbersome certificate problem in conventional public key cryptography (PKC). Motivated by the appealing features of CLPKC, several certificateless encryption with keyword search (CLEKS) schemes have been presented in the literature. But, our cryptanalysis demonstrates that the previously proposed CLEKS frameworks suffer from the security vulnerability caused by the keyword guessing attack. To remedy the security weakness in the previous frameworks and provide resistance against both inside and outside keyword guessing attacks, we propose a new CLEKS framework. Under the new framework, we design a concrete CLEKS scheme and formally prove its security in the random oracle model. Compared with previous two CLEKS schemes, the proposed scheme has better overall performance while offering stronger security guarantee as it withstands the existing known types of keyword guessing attacks.
引用
收藏
页码:156 / 173
页数:18
相关论文
共 40 条
[1]  
Abdalla M, 2001, LECT NOTES COMPUT SC, V2020, P143
[2]   Searchable encryption revisited: Consistency properties, relation to anonymous IBE, and extensions [J].
Abdalla, Michel ;
Bellare, Mihir ;
Catalano, Dario ;
Kiltz, Eike ;
Kohno, Tadayoshi ;
Lange, Tanja ;
Malone-Lee, John ;
Neven, Gregory ;
Paillier, Pascal ;
Shi, Haixia .
JOURNAL OF CRYPTOLOGY, 2008, 21 (03) :350-391
[3]  
Al-Riyami SS, 2003, LECT NOTES COMPUT SC, V2894, P452
[4]  
[Anonymous], 2001, ANN INT CRYPTOLOGY C
[5]  
[Anonymous], 1993, ACM CCS 1993, DOI DOI 10.1145/168588.168596
[6]  
[Anonymous], P INT WORKSH INF SEC
[7]  
[Anonymous], 2015, INT C NETW SYST SEC
[8]  
Baek J, 2008, LECT NOTES COMPUT SC, V5072, P1249, DOI 10.1007/978-3-540-69839-5_96
[9]  
Boneh D, 2004, LECT NOTES COMPUT SC, V3027, P506
[10]  
Byun JW, 2006, LECT NOTES COMPUT SC, V4165, P75