Trapdoor security in a searchable public-key encryption scheme with a designated tester

被引:216
|
作者
Rhee, Hyun Sook [1 ]
Park, Jong Hwan [2 ]
Susilo, Willy [3 ]
Lee, Dong Hoon [1 ]
机构
[1] Korea Univ, Grad Sch Informat Management & Secur, Seoul 136701, South Korea
[2] Kyung Hee Univ, Coll Appl Sci, Dept Appl Math, Yongin 446701, Gyeonggi Do, South Korea
[3] Univ Wollongong, Ctr Comp & Informat Secur Res, Sch Comp Sci & Software Engn, Wollongong, NSW 2522, Australia
关键词
Keyword search on encrypted data; Designated tester; Data security; CONJUNCTIVE KEYWORD SEARCH;
D O I
10.1016/j.jss.2009.11.726
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
We study a secure searchable public-key encryption scheme with a designated tester (dPEKS). The contributions of this paper are threefold. First, we enhance the existing security model to incorporate the realistic abilities of dPEKS attackers. Second, we introduce the concept of "trapdoor indistinguishability" and show that trapdoor indistinguishability is a sufficient condition for thwarting keyword-guessing attacks. This answers the open problem of how to construct PEKS (dPEKS) schemes that are provably secure against keyword-guessing attacks. Finally, we propose a dPEKS scheme that is secure in the enhanced security model. The scheme is the first dPEKS scheme that is secure against keyword-guessing attacks. (C) 2009 Elsevier Inc. All rights reserved.
引用
收藏
页码:763 / 771
页数:9
相关论文
共 50 条
  • [21] Efficient Public-Key Searchable Encryption Scheme From PSI With Scalable Proxy Servers
    Kong, Xiangqian
    Chen, Lanxiang
    Zhu, Yizhao
    Mu, Yi
    IEEE TRANSACTIONS ON SERVICES COMPUTING, 2024, 17 (06) : 3527 - 3540
  • [22] On the security of hybrid public-key encryption
    Nagao, W
    Manabe, Y
    Okamoto, T
    ISAS/CITSA 2004: International Conference on Cybernetics and Information Technologies, Systems and Applications and 10th International Conference on Information Systems Analysis and Synthesis, Vol 1, Proceedings: COMMUNICATIONS, INFORMATION TECHNOLOGIES AND COMPUTING, 2004, : 28 - 33
  • [23] A New Public-Key Encryption Scheme
    Hai-Bo Tian
    Xi Sun
    Yu-Min Wang
    Journal of Computer Science and Technology, 2007, 22 : 95 - 102
  • [24] A new public-key encryption scheme
    Tian, Hai-Bo
    Sun, Xi
    Wang, Yu-Min
    JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, 2007, 22 (01) : 95 - 102
  • [25] Certificateless searchable public key authenticated encryption with designated tester for cloud-assisted medical Internet of Things
    Wu, Libing
    Zhang, Yubo
    Ma, Mimi
    Kumar, Neeraj
    He, Debiao
    ANNALS OF TELECOMMUNICATIONS, 2019, 74 (7-8) : 423 - 434
  • [26] Certificateless searchable public key authenticated encryption with designated tester for cloud-assisted medical Internet of Things
    Libing Wu
    Yubo Zhang
    Mimi Ma
    Neeraj Kumar
    Debiao He
    Annals of Telecommunications, 2019, 74 : 423 - 434
  • [27] Multi-keyword ranked searchable public-key encryption
    Hu, Chengyu
    Yang, Bo
    Liu, Pengtao
    INTERNATIONAL JOURNAL OF GRID AND UTILITY COMPUTING, 2015, 6 (3-4) : 221 - 231
  • [28] Toward Data Security in 6G Networks: A Public-Key Searchable Encryption Approach
    Shi, Junbin
    Yu, Yong
    Yu, Qiming
    Li, Huilin
    Wang, Lianhai
    IEEE NETWORK, 2022, 36 (04): : 166 - 173
  • [29] An efficient public-key searchable encryption scheme secure against inside keyword guessing attacks
    Huang, Qiong
    Li, Hongbo
    INFORMATION SCIENCES, 2017, 403 : 1 - 14
  • [30] PPSEB: A Postquantum Public-Key Searchable Encryption Scheme on Blockchain for E-Healthcare Scenarios
    Xu, Gang
    Xu, Shiyuan
    Cao, Yibo
    Yun, Fan
    Cui, Yu
    Yu, Yiying
    Xiao, Ke
    SECURITY AND COMMUNICATION NETWORKS, 2022, 2022