Trapdoor Privacy in Public Key Encryption With Keyword Search: A Review

被引:3
|
作者
Chan, Koon-Ming [1 ]
Heng, Swee-Huay [1 ]
Yau, Wei-Chuen [2 ]
Tan, Shing-Chiang [1 ]
机构
[1] Multimedia Univ, Fac Informat Sci & Technol, Jalan Ayer Keroh Lama, Melaka 75450, Malaysia
[2] Xiamen Univ Malaysia, Sch Comp & Data Sci, Sepang 43900, Selangor Darul, Malaysia
关键词
Encryption; Public key; Servers; Privacy; Keyword search; Cloud computing; Receivers; PEKS; searchable encryption; trapdoor privacy; keyword privacy; IDENTITY-BASED ENCRYPTION; GUESSING ATTACKS; AUTHENTICATED ENCRYPTION; SECURE; SCHEME; SERVER; EFFICIENT;
D O I
10.1109/ACCESS.2022.3151429
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The public key encryption with keyword search (PEKS) scheme allows searches to be performed over ciphertext by a server in a public-key setting. The PEKS scheme suffers from a major drawback which is keyword guessing attack. A keyword guessing attack (KGA) allows the attacker to successfully guess the correct keyword encrypted in a searchable ciphertext and trapdoor. To overcome this vulnerability, security notions, such as keyword privacy and trapdoor privacy were introduced. Keyword privacy prevents any information leaked from the keyword itself, and similarly trapdoor privacy prevents any information leaked from the trapdoor side. A PEKS scheme that is secure against KGA should satisfy trapdoor privacy. In this paper, we compare various types of PEKS schemes in terms of their underlying computational hardness, system model, search function, security properties of keyword privacy and trapdoor privacy, and security against offline KGA and online KGA. From the comparison analysis, we highlight that trapdoor privacy and keyword privacy are essential for a PEKS scheme to be secure against KGA. Lastly, we draw some potential research directions.
引用
收藏
页码:21584 / 21598
页数:15
相关论文
共 50 条
  • [41] A New Public Key Encryption with Conjunctive Field Keyword Search Scheme
    Hwang, Min-Shiang
    Hsu, Shih-Ting
    Lee, Cheng-Chi
    INFORMATION TECHNOLOGY AND CONTROL, 2014, 43 (03): : 277 - 288
  • [42] Public-Key Authenticated Encryption with Keyword Search Without Pairings
    Yang N.
    Zhou Q.
    Xu S.
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2020, 57 (10): : 2125 - 2135
  • [43] Tree-Based Public Key Encryption with Conjunctive Keyword Search
    Zhang, Yu
    You, Lei
    Li, Yin
    SECURITY AND COMMUNICATION NETWORKS, 2021, 2021
  • [44] Public Key Encryption with Keyword Search from Lattices in Multiuser Environments
    Wu, Daini
    Wang, Xiaoming
    Gan, Qingqing
    MATHEMATICAL PROBLEMS IN ENGINEERING, 2016, 2016
  • [45] A New General Framework for Secure Public Key Encryption with Keyword Search
    Chen, Rongmao
    Mu, Yi
    Yang, Guomin
    Guo, Fuchun
    Wang, Xiaofen
    INFORMATION SECURITY AND PRIVACY (ACISP 2015), 2015, 9144 : 59 - 76
  • [46] Efficient public key encryption with revocable keyword search in cloud computing
    Zhang, Jianhong
    Mao, Jian
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2016, 19 (03): : 1211 - 1217
  • [47] Efficient public key encryption with keyword search schemes from pairings
    Gu, Chunxiang
    Zhu, Yuefei
    Pan, Heng
    INFORMATION SECURITY AND CRYPTOLOGY, 2008, 4990 : 372 - +
  • [48] Exposure Resilient Public-key Encryption with Keyword Search against Keyword Guessing Attack
    Uemura, Kaito
    Obana, Satoshi
    SECRYPT 2021: PROCEEDINGS OF THE 18TH INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2021, : 692 - 697
  • [49] Dual-Server Public-Key Authenticated Encryption with Keyword Search
    Chen, Biwen
    Wu, Libing
    Zeadally, Sherali
    He, Debiao
    IEEE TRANSACTIONS ON CLOUD COMPUTING, 2022, 10 (01) : 322 - 333
  • [50] Provable Secure Dual-Server Public Key Encryption with Keyword Search
    Huang, Kaibin
    Tso, Raylin
    2017 IEEE 2ND INTERNATIONAL VERIFICATION AND SECURITY WORKSHOP (IVSW), 2017, : 39 - 44