On the Security of a Certificateless Public Key Encryption with Keyword Search

被引:3
|
作者
Wu, Tsu-Yang [1 ,2 ]
Meng, Chao [3 ]
Chen, Chien-Ming [3 ]
Wang, King-Hang [4 ]
Pan, Jeng-Shyang [1 ,2 ]
机构
[1] Fujian Univ Technol, Fujian Prov Key Lab Big Data Min & Apllicat, Fuzhou 350118, Fujian, Peoples R China
[2] Fujian Univ Technol, Natl Demonstrat Ctr Expt Elect Informat & Elect T, Fuzhou 350118, Fujian, Peoples R China
[3] Harbin Inst Technol, Shenzhen Grad Sch, Shenzhen 518055, Peoples R China
[4] Hong Kong Univ Sci & Technol, Dept Comp Sci & Engn, Kowloon, Hong Kong, Peoples R China
基金
中国国家自然科学基金;
关键词
Public key encryption with keyword search; Certificateless; Off-line keyword guessing attack; Cryptanalysis; GUESSING ATTACKS; SCHEME;
D O I
10.1007/978-3-319-63856-0_24
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Public key encryption with keyword search (PEKS) is one of searchable encryption mechanisms. It not only provides user to retrieve ciphertext by keyword but also protects the confidentiality of keyword. In the past, many PEKS schemes based on different cryptosystems were proposed. Recently. Zheng et al. proposed a certificateless based PEKS scheme called CLKS. In this paper, we show that Zheng et al.' s CLKS scheme has some security flaw, i.e. their scheme suffered from an off-line keyword guessing attack.
引用
收藏
页码:191 / 197
页数:7
相关论文
共 50 条
  • [41] TCA-PEKS: Trusted certificateless authentication public-key encryption with keyword search scheme in cloud storage
    Mu Han
    Puyi Xu
    Lei Xu
    Chungen Xu
    Peer-to-Peer Networking and Applications, 2023, 16 : 156 - 169
  • [42] TCA-PEKS: Trusted certificateless authentication public-key encryption with keyword search scheme in cloud storage
    Han, Mu
    Xu, Puyi
    Xu, Lei
    Xu, Chungen
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2023, 16 (01) : 156 - 169
  • [43] Public-Key Encryption With Keyword Search via Obfuscation
    Hu, Chengyu
    Liu, Pengtao
    Yang, Rupeng
    Xu, Yan
    IEEE ACCESS, 2019, 7 : 37394 - 37405
  • [44] Trapdoor Privacy in Public Key Encryption With Keyword Search: A Review
    Chan, Koon-Ming
    Heng, Swee-Huay
    Yau, Wei-Chuen
    Tan, Shing-Chiang
    IEEE ACCESS, 2022, 10 : 21584 - 21598
  • [45] A Survey on Public Key Encryption with Keyword Search: Taxonomy and Methods
    Noorallahzade, M. H.
    Alimoradi, R.
    Gholami, A.
    INTERNATIONAL JOURNAL OF MATHEMATICS AND MATHEMATICAL SCIENCES, 2022, 2022
  • [46] Public Key Authenticated Encryption with Keyword Search from LWE
    Cheng, Leixiao
    Meng, Fei
    COMPUTER SECURITY - ESORICS 2022, PT I, 2022, 13554 : 303 - 324
  • [47] Server-Aided Public Key Encryption With Keyword Search
    Chen, Rongmao
    Mu, Yi
    Yang, Guomin
    Guo, Fuchun
    Huang, Xinyi
    Wang, Xiaofen
    Wang, Yongjun
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2016, 11 (12) : 2833 - 2842
  • [48] Public-Key Encryption with Keyword Search from Lattice
    Hou, Changjiang
    Liu, Fei
    Bai, Hongtao
    Ren, Lanfang
    2013 EIGHTH INTERNATIONAL CONFERENCE ON P2P, PARALLEL, GRID, CLOUD AND INTERNET COMPUTING (3PGCIC 2013), 2013, : 336 - 339
  • [49] Revocable Certificateless Public Key Encryption
    Tsai, Tung-Tso
    Tseng, Yuh-Min
    IEEE SYSTEMS JOURNAL, 2015, 9 (03): : 824 - 833
  • [50] Certificateless authenticated encryption with keyword search: Enhanced security model and a concrete construction for industrial IoT
    Pakniat, Nasrollah
    Shiraly, Danial
    Eslami, Ziba
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2020, 53