On the Security of Secure Keyword Search and Data Sharing Mechanism for Cloud Computing

被引:0
|
作者
Li, Cong [1 ,2 ,3 ,4 ]
Feng, Xinyu [3 ,4 ,5 ]
Shen, Qingni [3 ,4 ,5 ]
Wu, Zhonghai [3 ,4 ,5 ]
机构
[1] Peking Univ, Sch Comp Sci, Beijing 100871, Peoples R China
[2] Peking Univ, Natl Engn Res Ctr Software Engn, Beijing 100871, Peoples R China
[3] Peking Univ, Key Lab High Confidence Software Technol, Minist Educ, Beijing 100871, Peoples R China
[4] Peking Univ, PKU OCTA Lab Blockchain & Privacy Comp, Beijing 100871, Peoples R China
[5] Peking Univ, Sch Software & Microelect, Beijing 102600, Peoples R China
基金
国家重点研发计划;
关键词
Cryptanalysis; attribute-based encryption; proxy re-encryption; keyword search; keyword updating;
D O I
10.1109/TDSC.2023.3346795
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Nearly all of the previous attribute-based proxy re-encryption (ABPRE) schemes cannot support keyword search and keyword updating without the aid of private key generator (PKG) simultaneously. To resolve this problem, recently in IEEE Transactions on Dependable and Secure Computing (doi: 10.1109/TDSC.2020.2963978), Ge et al. proposed a ciphertext-policy ABPRE scheme with keyword search, dubbed CPAB-KSDS, which supports keyword updating without communicating with PKG. It also achieves indistinguishability against chosen-ciphertext attack (IND-CCA) security and indistinguishability against chosen-keyword attack (IND-CKA) security in the random oracle model. In this paper, we carefully analyze the security of Ge et al.'s CPAB-KSDS scheme and find that they did not give a correct reduction from IND-CKA security of theirs to the underlying cryptographic assumption. Furthermore, we also give a concrete attack on IND-CKA security of the CPAB-KSDS scheme. Therefore, it fails to achieve IND-CKA security they claimed, which is an essential security requirement for the encryption scheme with keyword search.
引用
收藏
页码:4306 / 4308
页数:3
相关论文
共 50 条
  • [41] Evaluable Secure Ranked Keyword Search Scheme over Encrypted Cloud Data
    Jia Zhi-peng
    Zhang Ya-ling
    Wang Shang-ping
    Sun Qin-dong
    2013 9TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS), 2013, : 697 - 701
  • [42] Enabling Secure and Efficient Ranked Keyword Search over Outsourced Cloud Data
    Wang, Cong
    Cao, Ning
    Ren, Kui
    Lou, Wenjing
    IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2012, 23 (08) : 1467 - 1479
  • [43] Confusing-Keyword Based Secure Search over Encrypted Cloud Data
    Zhangjie Fu
    Yangen Liu
    Xingming Sun
    Yuling Liu
    Zuwei Tian
    Mobile Networks and Applications, 2020, 25 : 125 - 132
  • [44] Keyword Search over Shared Cloud Data without Secure Channel or Authority
    Wu, Yilun
    Su, Jinshu
    Li, Baochun
    2015 IEEE 8TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING, 2015, : 580 - 587
  • [45] Confusing-Keyword Based Secure Search over Encrypted Cloud Data
    Fu, Zhangjie
    Liu, Yangen
    Sun, Xingming
    Liu, Yuling
    Tian, Zuwei
    MOBILE NETWORKS & APPLICATIONS, 2020, 25 (01): : 125 - 132
  • [46] A Secure Data Security Infrastructure for Small Organization in Cloud Computing
    Noor, Manan Binth Taj
    Biswas, Sumon
    2ND INTERNATIONAL CONFERENCE ON ELECTRICAL ENGINEERING AND INFORMATION COMMUNICATION TECHNOLOGY (ICEEICT 2015), 2015,
  • [47] Security analysis of secure kNN and ranked keyword search over encrypted data
    Ogata, Wakaha
    Otemori, Takaaki
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2020, 19 (04) : 419 - 425
  • [48] Security analysis of secure kNN and ranked keyword search over encrypted data
    Wakaha Ogata
    Takaaki Otemori
    International Journal of Information Security, 2020, 19 : 419 - 425
  • [49] Advancing cloud security: Unveiling the protective potential of homomorphic secret sharing in secure cloud computing
    Ali, Sijjad
    Wadho, Shuaib Ahmed
    Yichiet, Aun
    Gan, Ming Lee
    Lee, Chen Kang
    EGYPTIAN INFORMATICS JOURNAL, 2024, 27
  • [50] A fine-grained authorized keyword secure search scheme with efficient search permission update in cloud computing
    Yin, Hui
    Qin, Zheng
    Zhang, Jixin
    Deng, Hua
    Li, Fangmin
    Li, Keqin
    JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2020, 135 : 56 - 69