Trapdoor Privacy in Public Key Encryption With Keyword Search: A Review

被引:3
|
作者
Chan, Koon-Ming [1 ]
Heng, Swee-Huay [1 ]
Yau, Wei-Chuen [2 ]
Tan, Shing-Chiang [1 ]
机构
[1] Multimedia Univ, Fac Informat Sci & Technol, Jalan Ayer Keroh Lama, Melaka 75450, Malaysia
[2] Xiamen Univ Malaysia, Sch Comp & Data Sci, Sepang 43900, Selangor Darul, Malaysia
关键词
Encryption; Public key; Servers; Privacy; Keyword search; Cloud computing; Receivers; PEKS; searchable encryption; trapdoor privacy; keyword privacy; IDENTITY-BASED ENCRYPTION; GUESSING ATTACKS; AUTHENTICATED ENCRYPTION; SECURE; SCHEME; SERVER; EFFICIENT;
D O I
10.1109/ACCESS.2022.3151429
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The public key encryption with keyword search (PEKS) scheme allows searches to be performed over ciphertext by a server in a public-key setting. The PEKS scheme suffers from a major drawback which is keyword guessing attack. A keyword guessing attack (KGA) allows the attacker to successfully guess the correct keyword encrypted in a searchable ciphertext and trapdoor. To overcome this vulnerability, security notions, such as keyword privacy and trapdoor privacy were introduced. Keyword privacy prevents any information leaked from the keyword itself, and similarly trapdoor privacy prevents any information leaked from the trapdoor side. A PEKS scheme that is secure against KGA should satisfy trapdoor privacy. In this paper, we compare various types of PEKS schemes in terms of their underlying computational hardness, system model, search function, security properties of keyword privacy and trapdoor privacy, and security against offline KGA and online KGA. From the comparison analysis, we highlight that trapdoor privacy and keyword privacy are essential for a PEKS scheme to be secure against KGA. Lastly, we draw some potential research directions.
引用
收藏
页码:21584 / 21598
页数:15
相关论文
共 50 条
  • [31] Public-Key Encryption with Keyword Search from Lattice
    Hou, Changjiang
    Liu, Fei
    Bai, Hongtao
    Ren, Lanfang
    2013 EIGHTH INTERNATIONAL CONFERENCE ON P2P, PARALLEL, GRID, CLOUD AND INTERNET COMPUTING (3PGCIC 2013), 2013, : 336 - 339
  • [32] Privacy-Preserving Key-Updatable Public Key Encryption with Keyword Search Supporting Ciphertext Sharing Function
    Wang, Fen
    Lu, Yang
    Wang, Zhongqi
    Tian, Jinmei
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2022, 16 (01) : 266 - 286
  • [33] Public-key authenticated encryption with keyword search achieving both multi-ciphertext and multi-trapdoor indistinguishability
    Pan, Xiangyu
    Li, Fagen
    JOURNAL OF SYSTEMS ARCHITECTURE, 2021, 115
  • [34] Dual trapdoor identity-based encryption with keyword search
    Liu, Jia'nan
    Lai, Junzuo
    Huang, Xinyi
    SOFT COMPUTING, 2017, 21 (10) : 2599 - 2607
  • [35] Dual trapdoor identity-based encryption with keyword search
    Jia’nan Liu
    Junzuo Lai
    Xinyi Huang
    Soft Computing, 2017, 21 : 2599 - 2607
  • [36] SCF-PEPCKS: Secure Channel Free Public Key Encryption With Privacy-Conserving Keyword Search
    Lu, Yang
    Li, Jiguo
    Zhang, Yichen
    IEEE ACCESS, 2019, 7 : 40878 - 40892
  • [37] Privacy-Preserving and Efficient Public Key Encryption with Keyword Search Based on CP-ABE in Cloud
    Zhou, Yunhong
    Zheng, Shihui
    Wang, Licheng
    CRYPTOGRAPHY, 2020, 4 (04) : 1 - 14
  • [38] Privacy-Preserving Preselection for Protected Biometric Identification Using Public-Key Encryption With Keyword Search
    Bauspiess, Pia
    Kolberg, Jascha
    Drozdowski, Pawel
    Rathgeb, Christian
    Busch, Christoph
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2023, 19 (05) : 6972 - 6981
  • [39] Efficient public key encryption with revocable keyword search in cloud computing
    Jianhong Zhang
    Jian Mao
    Cluster Computing, 2016, 19 : 1211 - 1217
  • [40] StopGuess: A framework for public-key authenticated encryption with keyword search
    Xiang, Tao
    Wang, Zhongming
    Chen, Biwen
    Li, Xiaoguo
    Wang, Peng
    Chen, Fei
    COMPUTER STANDARDS & INTERFACES, 2024, 88