On the Security of a Certificateless Searchable Public Key Encryption Scheme

被引:18
作者
Wu, Tsu-Yang [1 ]
Meng, Fanya [1 ]
Chen, Chien-Ming [1 ]
Liu, Shuai [1 ]
Pan, Jeng-Shyang [1 ,2 ]
机构
[1] Harbin Inst Technol, Shenzhen Grad Sch, Sch Comp Sci & Technol, Shenzhen 518055, Peoples R China
[2] Fujian Univ Technol, Fujian Prov Key Lab Big Data Min & Apllicat, 3 Xueyuan Rd, Fuzhou 350118, Peoples R China
来源
GENETIC AND EVOLUTIONARY COMPUTING | 2017年 / 536卷
基金
中国国家自然科学基金;
关键词
Searchable public key encryption; Certificateless; Malicious PKG attack; Off-line keyword guessing attack; GENERIC CONSTRUCTION; EXCHANGE PROTOCOL; STRONGLY SECURE; KEYWORD SEARCH; SIGNATURE;
D O I
10.1007/978-3-319-48490-7_14
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Searchable public key encryption is a cryptographic mechanism which provides an efficient way to search an encrypted keyword. In this paper, we show that Peng et al.'s certificateless searchable public key encryption scheme suffered from a malicious PKG attack and an off-line keyword guessing attack. In the first attack, a malicious PKG can obtain a part of an authorized receiver's private key. In the second attack, the malicious PKG can guess a keyword related to the authorized receiver's trapdoor using the part of receiver's private.
引用
收藏
页码:113 / 119
页数:7
相关论文
共 25 条
[1]  
Al-Riyami SS, 2005, LECT NOTES COMPUT SC, V3386, P398
[2]  
Al-Riyami SS, 2003, LECT NOTES COMPUT SC, V2894, P452
[3]  
Au M.H., 2007, P 2 ACM S INF COMP C, P302, DOI DOI 10.1145/1229285.1266997
[4]  
Baek J, 2008, LECT NOTES COMPUT SC, V5072, P1249, DOI 10.1007/978-3-540-69839-5_96
[5]  
Boneh D, 2004, LECT NOTES COMPUT SC, V3027, P506
[6]   Identity-based encryption from the Weil pairing [J].
Boneh, D ;
Franklin, M .
SIAM JOURNAL ON COMPUTING, 2003, 32 (03) :586-615
[7]   Identity-based key agreement protocols from pairings [J].
Chen, L. ;
Cheng, Z. ;
Smart, N. P. .
INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2007, 6 (04) :213-241
[8]  
Cheng ZH, 2007, LECT NOTES COMPUT SC, V4575, P83
[9]   A survey of certificateless encryption schemes and security models [J].
Dent, Alexander W. .
INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2008, 7 (05) :349-377
[10]  
Dent AW, 2008, LECT NOTES COMPUT SC, V4939, P344, DOI 10.1007/978-3-540-78440-1_20