On the Security of a Certificateless Public Key Encryption with Keyword Search

被引:3
|
作者
Wu, Tsu-Yang [1 ,2 ]
Meng, Chao [3 ]
Chen, Chien-Ming [3 ]
Wang, King-Hang [4 ]
Pan, Jeng-Shyang [1 ,2 ]
机构
[1] Fujian Univ Technol, Fujian Prov Key Lab Big Data Min & Apllicat, Fuzhou 350118, Fujian, Peoples R China
[2] Fujian Univ Technol, Natl Demonstrat Ctr Expt Elect Informat & Elect T, Fuzhou 350118, Fujian, Peoples R China
[3] Harbin Inst Technol, Shenzhen Grad Sch, Shenzhen 518055, Peoples R China
[4] Hong Kong Univ Sci & Technol, Dept Comp Sci & Engn, Kowloon, Hong Kong, Peoples R China
基金
中国国家自然科学基金;
关键词
Public key encryption with keyword search; Certificateless; Off-line keyword guessing attack; Cryptanalysis; GUESSING ATTACKS; SCHEME;
D O I
10.1007/978-3-319-63856-0_24
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Public key encryption with keyword search (PEKS) is one of searchable encryption mechanisms. It not only provides user to retrieve ciphertext by keyword but also protects the confidentiality of keyword. In the past, many PEKS schemes based on different cryptosystems were proposed. Recently. Zheng et al. proposed a certificateless based PEKS scheme called CLKS. In this paper, we show that Zheng et al.' s CLKS scheme has some security flaw, i.e. their scheme suffered from an off-line keyword guessing attack.
引用
收藏
页码:191 / 197
页数:7
相关论文
共 50 条
  • [21] On the Security of a Certificateless Searchable Public Key Encryption Scheme
    Wu, Tsu-Yang
    Meng, Fanya
    Chen, Chien-Ming
    Liu, Shuai
    Pan, Jeng-Shyang
    GENETIC AND EVOLUTIONARY COMPUTING, 2017, 536 : 113 - 119
  • [22] Designated tester certificateless encryption with keyword search
    Pakniat, Nasrollah
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2019, 49
  • [23] High-Speed High-Security Public Key Encryption with Keyword Search
    Behnia, Rouzbeh
    Yavuz, Attila Altay
    Ozmen, Muslum Ozgur
    DATA AND APPLICATIONS SECURITY AND PRIVACY XXXI, DBSEC 2017, 2017, 10359 : 365 - 385
  • [24] Public-key authenticated encryption with keyword search revisited: Security model and constructions
    Qin, Baodong
    Chen, Yu
    Huang, Qiong
    Liu, Ximeng
    Zheng, Dong
    INFORMATION SCIENCES, 2020, 516 : 515 - 528
  • [25] Public-Key Encryption with Registered Keyword Search
    Tang, Qiang
    Chen, Liqun
    PUBLIC KEY INFRASTRUCTURES, SERVICES AND APPLICATIONS, 2010, 6391 : 163 - +
  • [26] Public key encryption with conjunctive keyword search on lattice
    Wang, Peng
    Xiang, Tao
    Li, Xiaoguo
    Xiang, Hong
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2020, 51
  • [27] Public key encryption with conjunctive field keyword search
    Park, DJ
    Kim, K
    Lee, PJ
    INFORMATION SECURITY APPLICATIONS, 2005, 3325 : 73 - 86
  • [28] Public Key Encryption with Multi-keyword Search
    Hu, Chengyu
    He, Peng
    Liu, Pengtao
    NETWORK COMPUTING AND INFORMATION SECURITY, 2012, 345 : 568 - +
  • [29] Public key encryption with temporary and fuzzy keyword search
    Vaanchig, Nyamsuren
    Qin, Zhiguang
    MATHEMATICAL BIOSCIENCES AND ENGINEERING, 2019, 16 (05) : 3914 - 3935
  • [30] Efficient public key encryption with revocable keyword search
    Yu, Yong
    Ni, Jianbing
    Yang, Haomiao
    Mu, Yi
    Susilo, Willy
    SECURITY AND COMMUNICATION NETWORKS, 2014, 7 (02) : 466 - 472