Cryptanalysis of Keyword Confidentiality in a Searchable Public-Key Encryption Scheme Against Malicious Server

被引:0
|
作者
Zhang, Nan [1 ,2 ]
Qin, Baodong [1 ,2 ]
Zheng, Dong [1 ,2 ]
机构
[1] Xian Univ Posts & Telecommun, Xian 710121, Peoples R China
[2] Natl Engn Res Ctr Secured Wireless, Xian, Peoples R China
基金
中国国家自然科学基金;
关键词
AUTHENTICATED ENCRYPTION; GUESSING ATTACKS; SECURE;
D O I
10.1049/ise2/2464518
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Public-key authenticated encryption with keyword search (PAEKS) is a novel cryptographic primitive to resist against keyword-guessing attacks (KGAs) and preserve the privacy of keywords in both ciphertexts and trapdoors. Recently, a designated-server PAEKS (dPAEKS) scheme was proposed to withstand KGAs. The scheme was claimed to satisfy both multi-ciphertext indistinguishability (MCI) and multi-trapdoor privacy (MTP). However, our cryptanalysis demonstrates that it is insecure against KGAs, where a malicious server (inside attacker) can obtain the information of the keywords embedded in the ciphertext and the trapdoor. As a result, both the MCI and MTP of the scheme are broken. In addition, the paper also shows that it is possible to break the security of MTP, even for an outside attacker. Finally, we also provide a method to fix these security flaws.
引用
收藏
页数:9
相关论文
共 50 条
  • [21] Trapdoor Security Lattice-Based Public-Key Searchable Encryption with a Designated Cloud Server
    Zhang, Xiaojun
    Xu, Chunxiang
    WIRELESS PERSONAL COMMUNICATIONS, 2018, 100 (03) : 907 - 921
  • [22] Trapdoor Security Lattice-Based Public-Key Searchable Encryption with a Designated Cloud Server
    Xiaojun Zhang
    Chunxiang Xu
    Wireless Personal Communications, 2018, 100 : 907 - 921
  • [23] Lattice-based searchable public-key encryption scheme for secure cloud storage
    Xie, Run
    Xu, Chunxiang
    He, Chanlian
    Zhang, Xiaojun
    INTERNATIONAL JOURNAL OF WEB AND GRID SERVICES, 2018, 14 (01) : 3 - 20
  • [24] Efficient Public-Key Searchable Encryption Scheme From PSI With Scalable Proxy Servers
    Kong, Xiangqian
    Chen, Lanxiang
    Zhu, Yizhao
    Mu, Yi
    IEEE TRANSACTIONS ON SERVICES COMPUTING, 2024, 17 (06) : 3527 - 3540
  • [25] Cryptanalysis of the public-key encryption based on braid groups
    Lee, E
    Park, JH
    ADVANCES IN CRYPTOLOGY-EUROCRYPT 2003, 2003, 2656 : 477 - 490
  • [26] A New Public-Key Encryption Scheme
    Hai-Bo Tian
    Xi Sun
    Yu-Min Wang
    Journal of Computer Science and Technology, 2007, 22 : 95 - 102
  • [27] Inverted Index Based Multi-Keyword Public-key Searchable Encryption with Strong Privacy Guarantee
    Wang, Bing
    Song, Wei
    Lou, Wenjing
    Hou, Y. Thomas
    2015 IEEE CONFERENCE ON COMPUTER COMMUNICATIONS (INFOCOM), 2015,
  • [28] Public-key encryption with keyword search secure against continual memory attacks
    Hu, Chengyu
    Yang, Rupeng
    Liu, Pengtao
    Yu, Zuoxia
    Zhou, Yongbin
    Xu, Qiuliang
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (11) : 1613 - 1629
  • [29] A new public-key encryption scheme
    Tian, Hai-Bo
    Sun, Xi
    Wang, Yu-Min
    JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, 2007, 22 (01) : 95 - 102
  • [30] Public-Key Encryption With Keyword Search via Obfuscation
    Hu, Chengyu
    Liu, Pengtao
    Yang, Rupeng
    Xu, Yan
    IEEE ACCESS, 2019, 7 : 37394 - 37405