On the Security of Secure Keyword Search and Data Sharing Mechanism for Cloud Computing

被引:0
|
作者
Li, Cong [1 ,2 ,3 ,4 ]
Feng, Xinyu [3 ,4 ,5 ]
Shen, Qingni [3 ,4 ,5 ]
Wu, Zhonghai [3 ,4 ,5 ]
机构
[1] Peking Univ, Sch Comp Sci, Beijing 100871, Peoples R China
[2] Peking Univ, Natl Engn Res Ctr Software Engn, Beijing 100871, Peoples R China
[3] Peking Univ, Key Lab High Confidence Software Technol, Minist Educ, Beijing 100871, Peoples R China
[4] Peking Univ, PKU OCTA Lab Blockchain & Privacy Comp, Beijing 100871, Peoples R China
[5] Peking Univ, Sch Software & Microelect, Beijing 102600, Peoples R China
基金
国家重点研发计划;
关键词
Cryptanalysis; attribute-based encryption; proxy re-encryption; keyword search; keyword updating;
D O I
10.1109/TDSC.2023.3346795
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Nearly all of the previous attribute-based proxy re-encryption (ABPRE) schemes cannot support keyword search and keyword updating without the aid of private key generator (PKG) simultaneously. To resolve this problem, recently in IEEE Transactions on Dependable and Secure Computing (doi: 10.1109/TDSC.2020.2963978), Ge et al. proposed a ciphertext-policy ABPRE scheme with keyword search, dubbed CPAB-KSDS, which supports keyword updating without communicating with PKG. It also achieves indistinguishability against chosen-ciphertext attack (IND-CCA) security and indistinguishability against chosen-keyword attack (IND-CKA) security in the random oracle model. In this paper, we carefully analyze the security of Ge et al.'s CPAB-KSDS scheme and find that they did not give a correct reduction from IND-CKA security of theirs to the underlying cryptographic assumption. Furthermore, we also give a concrete attack on IND-CKA security of the CPAB-KSDS scheme. Therefore, it fails to achieve IND-CKA security they claimed, which is an essential security requirement for the encryption scheme with keyword search.
引用
下载
收藏
页码:4306 / 4308
页数:3
相关论文
共 50 条
  • [1] Secure Keyword Search and Data Sharing Mechanism for Cloud Computing
    Ge, Chunpeng
    Susilo, Willy
    Liu, Zhe
    Xia, Jinyue
    Szalachowski, Pawel
    Fang Liming
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2021, 18 (06) : 2787 - 2800
  • [2] A Secure Cloud Data Sharing Protocol for Enterprise Supporting Hierarchical Keyword Search
    Li, Hongbo
    Huang, Qiong
    Susilo, Willy
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2022, 19 (03) : 1532 - 1543
  • [3] Towards Secure Data Sharing in Cloud Computing Using Attribute Based Proxy Re-Encryption with Keyword Search
    Hong, Hanshu
    Sun, Zhixin
    2017 2ND IEEE INTERNATIONAL CONFERENCE ON CLOUD COMPUTING AND BIG DATA ANALYSIS (ICCCBDA 2017), 2017, : 218 - 223
  • [4] Secure Sharing of Data in Cloud Computing
    Tiwari, Deepnarayan
    Gangadharan, G. R.
    SECURITY IN COMPUTING AND COMMUNICATIONS (SSCC 2015), 2015, 536 : 24 - 35
  • [5] Secure Conjunctive Multi-keyword Search for Multiple Data Owners in Cloud Computing
    Yin, Hui
    Qin, Zheng
    Zhang, Jixin
    Li, Wenjie
    Ou, Lu
    Hu, Yupeng
    Li, Keqin
    2016 IEEE 22ND INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED SYSTEMS (ICPADS), 2016, : 761 - 768
  • [6] Secure keyword search using dual encryption in cloud computing
    Tariq H.
    Agarwal P.
    International Journal of Information Technology, 2020, 12 (4) : 1063 - 1072
  • [7] Secure Ranked Multi-Keyword Search for Multiple Data Owners in Cloud Computing
    Zhang, Wei
    Xiao, Sheng
    Lin, Yaping
    Zhou, Ting
    Zhou, Siwang
    2014 44TH ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS (DSN), 2014, : 276 - 286
  • [8] An Enhance Mechanism for Secure Data Sharing with Identity Management in Cloud Computing
    Modi, Hardika
    Patel, Shital
    Suthar, Krunal
    ADVANCES IN COMPUTING AND INTELLIGENT SYSTEMS, ICACM 2019, 2020, : 575 - 582
  • [9] Secure Keyword Search over Encrypted Cloud Data Using Blockchain in Digital Document Sharing
    Verma, Garima
    Kanrar, Soumen
    WIRELESS PERSONAL COMMUNICATIONS, 2024, 134 (02) : 975 - 996
  • [10] Secure Keyword Search over Encrypted Cloud Data Using Blockchain in Digital Document Sharing
    Garima Verma
    Soumen Kanrar
    Wireless Personal Communications, 2024, 134 : 975 - 996