Public key encryption with keyword search secure against keyword guessing attacks without random oracle

被引:174
|
作者
Fang, Liming [1 ]
Susilo, Willy [2 ]
Ge, Chunpeng [1 ]
Wang, Jiandong [1 ]
机构
[1] Nanjing Univ Aeronaut & Astronaut, Coll Comp Sci & Technol, Nanjing, Jiangsu, Peoples R China
[2] Univ Wollongong, CCISR, Sch Comp Sci & Software Engn, Wollongong, NSW 2522, Australia
基金
中国国家自然科学基金;
关键词
Public key encryption with keyword search; Keyword guessing attack; Without random oracle; SCHEME; SUBSET; IBE;
D O I
10.1016/j.ins.2013.03.008
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The notion of public key encryption with keyword search (PEKS) was put forth by Boneh et al. to enable a server to search from a collection of encrypted emails given a "trapdoor" (i.e., an encrypted keyword) provided by the receiver. The nice property in this scheme allows the server to search for a keyword, given the trapdoor. Hence, the verifier can merely use an untrusted server, which makes this notion very practical. Following Boneh et al.'s work, there have been subsequent works that have been proposed to enhance this notion. Two important notions include the so-called keyword guessing attack and secure channel free, proposed by Byun et al. and Baek et al., respectively. The former realizes the fact that in practice, the space of the keywords used is very limited, while the latter considers the removal of secure channel between the receiver and the server to make PEKS practical. Unfortunately, the existing construction of PEKS secure against keyword guessing attack is only secure under the random oracle model, which does not reflect its security in the real world. Furthermore, there is no complete definition that captures secure channel free PEKS schemes that are secure against chosen keyword attack, chosen ciphertext attack, and against keyword guessing attacks, even though these notions seem to be the most practical application of PEKS primitives. In this paper, we make the following contributions. First, we define the strongest model of PEKS which is secure channel free and secure against chosen keyword attack, chosen ciphertext attack, and keyword guessing attack. In particular, we present two important security notions namely IND-SCF-CKCA and IND-KGA. The former is to capture an inside adversary, while the latter is to capture an outside adversary. Intuitively, it should be clear that IND-SCF-CKCA captures a more stringent attack compared to IND-KGA. Second, we present a secure channel free PEKS scheme secure without random oracle under the well known assumptions, namely DLP, DBDH, SXDH and truncated q-ABDHE assumption. Our contributions fill the gap in the literature andf hence, making the notion of PEKS very practical. We shall highlight that our scheme is IND-SCF-CKCA secure. (C) 2013 Elsevier Inc. All rights reserved.
引用
收藏
页码:221 / 241
页数:21
相关论文
共 50 条
  • [31] A Secure Attribute Based Keyword Search Scheme Against Keyword Guessing Attack
    Yousefipoor, Vahid
    Ameri, Mohammad Hassan
    Mohajeri, Javad
    Eghlidos, Taraneh
    2016 8TH INTERNATIONAL SYMPOSIUM ON TELECOMMUNICATIONS (IST), 2016, : 124 - 128
  • [32] A New General Framework for Secure Public Key Encryption with Keyword Search
    Chen, Rongmao
    Mu, Yi
    Yang, Guomin
    Guo, Fuchun
    Wang, Xiaofen
    INFORMATION SECURITY AND PRIVACY (ACISP 2015), 2015, 9144 : 59 - 76
  • [33] A Verifiable proxy re-encryption with keyword search without Random Oracle
    Guo, Lifeng
    Lu, Bo
    Li, Xiangyu
    Xu, He
    2013 9TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS), 2013, : 474 - 478
  • [34] Identity-Based Group Encryption With Keyword Search Against Keyword Guessing Attack
    Wang, Wei
    Liu, Dongli
    Zheng, Zilin
    Xu, Peng
    Yang, Laurence Tianruo
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2024, 19 : 8023 - 8036
  • [35] Proxy Re-Encryption Conjunctive Keyword Search against Keyword Guessing Attack
    Yang, Yang
    Ma, Maode
    Lin, Bogang
    2013 COMPUTING, COMMUNICATIONS AND IT APPLICATIONS CONFERENCE (COMCOMAP), 2013, : 125 - 130
  • [36] Efficient searchable public key encryption against keyword guessing attacks for cloud-based EMR systems
    Yang Lu
    Jiguo Li
    Cluster Computing, 2019, 22 : 285 - 299
  • [37] Efficient searchable public key encryption against keyword guessing attacks for cloud-based EMR systems
    Lu, Yang
    Li, Jiguo
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2019, 22 (01): : 285 - 299
  • [38] Combining Public Key Encryption with Keyword Search and Public Key Encryption
    Zhang, Rui
    Imai, Hideki
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2009, E92D (05) : 888 - 896
  • [39] Public key encryption with keyword search revisited
    Baek, Joonsang
    Safavi-Naini, Reihaneh
    Susilo, Willy
    COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2008, PT 1, PROCEEDINGS, 2008, 5072 : 1249 - 1259
  • [40] Public key encryption with distributed keyword search
    Eslami, Ziba
    Noroozi, Mahnaz
    Amirizirtol, Kobra
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2022, 25 (08): : 2369 - 2393