Comments on a chaos-based public key encryption with keyword search scheme

被引:0
|
作者
Mahnaz Noroozi
Ziba Eslami
Nasrollah Pakniat
机构
[1] Shahid Beheshti University G.C.,Department of Computer and Data Science
[2] Shahid Beheshti University G.C.,Cyberspace Research Institute
[3] Information Science Research Department,undefined
[4] Iranian Research Institute for Information Science and Technology (IRANDOC),undefined
来源
Nonlinear Dynamics | 2018年 / 94卷
关键词
Cloud storage services; Searchable encryption; Chaotic maps; Chebyshev polynomials; Keyword guessing attack;
D O I
暂无
中图分类号
学科分类号
摘要
Recently, Li et al. employed chaotic maps to propose a public key encryption with keyword search scheme. The authors claimed that their scheme provides security against keyword guessing attack (KGA) performed by inside and outside adversaries. The goal of this paper is to show that this claim is not true about inside attackers. We prove that it is possible for an inside adversary to launch an attack even more severe than KGA and obtain the corresponding keyword to any searchable ciphertext. We further propose a simple fix to overcome the proposed attack.
引用
收藏
页码:1127 / 1132
页数:5
相关论文
共 50 条
  • [1] Comments on a chaos-based public key encryption with keyword search scheme
    Noroozi, Mahnaz
    Eslami, Ziba
    Pakniat, Nasrollah
    NONLINEAR DYNAMICS, 2018, 94 (02) : 1127 - 1132
  • [2] Design and implementation of a chaos-based public key encryption scheme
    Wang, XB
    Zhang, LH
    Wu, Y
    PROCEEDINGS OF THE 11TH JOINT INTERNATIONAL COMPUTER CONFERENCE, 2005, : 79 - 82
  • [3] AN EFFICIENT PUBLIC KEY ENCRYPTION WITH CONJUNCTIVE KEYWORD SEARCH SCHEME BASED ON PAIRINGS
    Ding, Maozhen
    Gao, Fei
    Jin, Zhengping
    Zhang, Hua
    PROCEEDINGS OF THE 3RD IEEE INTERNATIONAL CONFERENCE ON NETWORK INFRASTRUCTURE AND DIGITAL CONTENT (IEEE IC-NIDC 2012), 2012, : 526 - 530
  • [4] Public key encryption with keyword search
    Boneh, D
    Di Crescenzo, G
    Ostrovsky, R
    Persiano, G
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2004, PROCEEDINGS, 2004, 3027 : 506 - 522
  • [5] Combining Public Key Encryption with Keyword Search and Public Key Encryption
    Zhang, Rui
    Imai, Hideki
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2009, E92D (05) : 888 - 896
  • [6] PUBLIC KEY ENCRYPTION WITH KEYWORD SEARCH BASED ON FACTORING
    Luo, Wenjun
    Tan, Jianming
    2012 IEEE 2ND INTERNATIONAL CONFERENCE ON CLOUD COMPUTING AND INTELLIGENT SYSTEMS (CCIS) VOLS 1-3, 2012, : 1245 - 1247
  • [7] Cryptanalysis of chaos-based ElGamal public-key encryption
    Hane, Ryuichi
    Kohda, Tohru
    INTERNATIONAL JOURNAL OF BIFURCATION AND CHAOS, 2007, 17 (10): : 3619 - 3623
  • [8] A New Public Key Encryption with Conjunctive Field Keyword Search Scheme
    Hwang, Min-Shiang
    Hsu, Shih-Ting
    Lee, Cheng-Chi
    INFORMATION TECHNOLOGY AND CONTROL, 2014, 43 (03): : 277 - 288
  • [9] CRYPTANALYSIS OF A CHAOS-BASED ENCRYPTION SCHEME
    Ergun, Salih
    2017 INTERNATIONAL SYMPOSIUM ON INTELLIGENT SIGNAL PROCESSING AND COMMUNICATION SYSTEMS (ISPACS 2017), 2017, : 474 - 479
  • [10] Generic combination of public key encryption with keyword search and public key encryption
    Zhang, Rui
    Imai, Hideki
    CRYPTOLOGY AND NETWORK SECURITY, 2007, 4856 : 159 - 174