Keyword guessing attacks on a public key encryption with keyword search scheme without random oracle and its improvement

被引:45
|
作者
Lu, Yang [1 ]
Wang, Gang [2 ]
Li, Jiguo [3 ,4 ]
机构
[1] Nanjing Normal Univ, Sch Comp Sci & Technol, Nanjing, Jiangsu, Peoples R China
[2] Hohai Univ, Coll Comp & Informat, Nanjing, Jiangsu, Peoples R China
[3] Fujian Normal Univ, Coll Math & Informat, Fuzhou, Fujian, Peoples R China
[4] Fujian Prov Key Lab Network Secur & Cryptol, Fuzhou, Fujian, Peoples R China
基金
中国国家自然科学基金;
关键词
Public key encryption with keyword search; Keyword guessing attack; Standard model; Outsider attacker; Malicious insider server; SECURE; EFFICIENT; SERVER;
D O I
10.1016/j.ins.2018.12.004
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Public key encryption with keyword search (PEKS) is a useful paradigm that enables a user to delegate searching capabilities on publicly encrypted data to an untrusted third party without revealing the data contents. In 2013, Fang et al. proposed a secure channel free PEKS (SCF-PEKS) scheme without random oracle and asserted that their scheme can withstand the keyword guessing (KG) attacks by outsider attackers. Later, Shao and Yang presented an improvement of Fang et al.'s SCF-PEKS scheme so as to obtain the security against KG attacks by malicious insider servers. In this paper, we demonstrate that both Fang et al.'s SCF-PEKS scheme and the improved scheme proposed by Shao and Yang fail in achieving their security goal. Our cryptanalysis shows that the former is vulnerable to the KG attacks by outsider attackers while the latter is vulnerable to the KG attacks by malicious insider servers. To overcome the security weaknesses in these two schemes, we present a new improvement of Fang et al.'s SCF-PEKS scheme. The analysis indicates that the improved scheme provides resistance against KG attacks by either outsider attackers or malicious insider servers. (C) 2018 Elsevier Inc. All rights reserved.
引用
收藏
页码:270 / 276
页数:7
相关论文
共 50 条
  • [31] Public-Key Authenticated Encryption with Keyword Search Without Pairings
    Yang N.
    Zhou Q.
    Xu S.
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2020, 57 (10): : 2125 - 2135
  • [32] A Fast Public Key Searchable Encryption Scheme Against Inside Keyword Attacks
    Liu, Can
    Chen, Ningjiang
    Huang, Ruwei
    Xie, Yongsheng
    COMPUTER SUPPORTED COOPERATIVE WORK AND SOCIAL COMPUTING, CHINESECSCW 2019, 2019, 1042 : 50 - 64
  • [33] Generic combination of public key encryption with keyword search and public key encryption
    Zhang, Rui
    Imai, Hideki
    CRYPTOLOGY AND NETWORK SECURITY, 2007, 4856 : 159 - 174
  • [34] On the integration of public key data encryption and public key encryption with keyword search
    Baek, Joonsang
    Safavi-Naini, Reihaneh
    Susilo, Willy
    INFORMATION SECURITY, PROCEEDINGS, 2006, 4176 : 217 - 232
  • [35] AN EFFICIENT PUBLIC KEY ENCRYPTION WITH CONJUNCTIVE KEYWORD SEARCH SCHEME BASED ON PAIRINGS
    Ding, Maozhen
    Gao, Fei
    Jin, Zhengping
    Zhang, Hua
    PROCEEDINGS OF THE 3RD IEEE INTERNATIONAL CONFERENCE ON NETWORK INFRASTRUCTURE AND DIGITAL CONTENT (IEEE IC-NIDC 2012), 2012, : 526 - 530
  • [36] Comments on a chaos-based public key encryption with keyword search scheme
    Noroozi, Mahnaz
    Eslami, Ziba
    Pakniat, Nasrollah
    NONLINEAR DYNAMICS, 2018, 94 (02) : 1127 - 1132
  • [37] Comments on a chaos-based public key encryption with keyword search scheme
    Mahnaz Noroozi
    Ziba Eslami
    Nasrollah Pakniat
    Nonlinear Dynamics, 2018, 94 : 1127 - 1132
  • [38] An efficient and secure certificateless searchable encryption scheme against keyword guessing attacks
    Senouci, Mohammed Raouf
    Benkhaddra, Ilyas
    Senouci, Abdelkader
    Li, Fagen
    JOURNAL OF SYSTEMS ARCHITECTURE, 2021, 119
  • [39] VR-PEKS: A Verifiable and Resistant to Keyword Guess Attack Public Key Encryption with Keyword Search Scheme
    Tang, Yingying
    Chen, Yuling
    Luo, Yun
    Dong, Sen
    Li, Tao
    APPLIED SCIENCES-BASEL, 2023, 13 (07):
  • [40] A more efficient public-key authenticated encryption scheme with keyword search
    Huang, Qiong
    Huang, Peisen
    Li, Hongbo
    Huang, Jianye
    Lin, Hongyuan
    JOURNAL OF SYSTEMS ARCHITECTURE, 2023, 137