Keyword guessing attacks on a public key encryption with keyword search scheme without random oracle and its improvement

被引:45
|
作者
Lu, Yang [1 ]
Wang, Gang [2 ]
Li, Jiguo [3 ,4 ]
机构
[1] Nanjing Normal Univ, Sch Comp Sci & Technol, Nanjing, Jiangsu, Peoples R China
[2] Hohai Univ, Coll Comp & Informat, Nanjing, Jiangsu, Peoples R China
[3] Fujian Normal Univ, Coll Math & Informat, Fuzhou, Fujian, Peoples R China
[4] Fujian Prov Key Lab Network Secur & Cryptol, Fuzhou, Fujian, Peoples R China
基金
中国国家自然科学基金;
关键词
Public key encryption with keyword search; Keyword guessing attack; Standard model; Outsider attacker; Malicious insider server; SECURE; EFFICIENT; SERVER;
D O I
10.1016/j.ins.2018.12.004
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Public key encryption with keyword search (PEKS) is a useful paradigm that enables a user to delegate searching capabilities on publicly encrypted data to an untrusted third party without revealing the data contents. In 2013, Fang et al. proposed a secure channel free PEKS (SCF-PEKS) scheme without random oracle and asserted that their scheme can withstand the keyword guessing (KG) attacks by outsider attackers. Later, Shao and Yang presented an improvement of Fang et al.'s SCF-PEKS scheme so as to obtain the security against KG attacks by malicious insider servers. In this paper, we demonstrate that both Fang et al.'s SCF-PEKS scheme and the improved scheme proposed by Shao and Yang fail in achieving their security goal. Our cryptanalysis shows that the former is vulnerable to the KG attacks by outsider attackers while the latter is vulnerable to the KG attacks by malicious insider servers. To overcome the security weaknesses in these two schemes, we present a new improvement of Fang et al.'s SCF-PEKS scheme. The analysis indicates that the improved scheme provides resistance against KG attacks by either outsider attackers or malicious insider servers. (C) 2018 Elsevier Inc. All rights reserved.
引用
收藏
页码:270 / 276
页数:7
相关论文
共 50 条
  • [21] A Verifiable proxy re-encryption with keyword search without Random Oracle
    Guo, Lifeng
    Lu, Bo
    Li, Xiangyu
    Xu, He
    2013 9TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS), 2013, : 474 - 478
  • [22] Combining Public Key Encryption with Keyword Search and Public Key Encryption
    Zhang, Rui
    Imai, Hideki
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2009, E92D (05) : 888 - 896
  • [23] A New Public Key Encryption with Conjunctive Field Keyword Search Scheme
    Hwang, Min-Shiang
    Hsu, Shih-Ting
    Lee, Cheng-Chi
    INFORMATION TECHNOLOGY AND CONTROL, 2014, 43 (03): : 277 - 288
  • [24] Public key encryption with keyword search revisited
    Baek, Joonsang
    Safavi-Naini, Reihaneh
    Susilo, Willy
    COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2008, PT 1, PROCEEDINGS, 2008, 5072 : 1249 - 1259
  • [25] Keyword Search Encryption Scheme Resistant Against Keyword-Guessing Attack by the Untrusted Server
    王智弘
    涂泰源
    Journal of Shanghai Jiaotong University(Science), 2014, 19 (04) : 440 - 442
  • [26] Keyword search encryption scheme resistant against keyword-guessing attack by the untrusted server
    Wang C.-H.
    Tu T.-Y.
    Journal of Shanghai Jiaotong University (Science), 2014, 19 (04) : 440 - 442
  • [27] Public key encryption with distributed keyword search
    Eslami, Ziba
    Noroozi, Mahnaz
    Amirizirtol, Kobra
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2022, 25 (08): : 2369 - 2393
  • [28] Public Key Encryption with Wildcards Keyword Search
    Wang, Zhao-li
    Han, Jin-li
    Wang, Mei-juan
    Shi, Ya-qing
    Dong, Hui
    2018 EIGHTH INTERNATIONAL CONFERENCE ON INSTRUMENTATION AND MEASUREMENT, COMPUTER, COMMUNICATION AND CONTROL (IMCCC 2018), 2018, : 538 - 541
  • [29] Certificateless Public Key Encryption with Keyword Search
    Peng Yanguo
    Cui Jiangtao
    Peng Changgen
    Ying Zuobin
    CHINA COMMUNICATIONS, 2014, 11 (11) : 100 - 113
  • [30] The Public Verifiability of Public Key Encryption with Keyword Search
    Zhu, Binrui
    Sun, Jiameng
    Qin, Jing
    Ma, Jixin
    MOBILE NETWORKS AND MANAGEMENT (MONAMI 2017), 2018, 235 : 299 - 312