Advertisement

Security Analysis of a Public Key Authenticated Encryption with Keyword Search Scheme

  • Tsu-Yang Wu
  • Chien-Ming Chen
  • King-Hang Wang
  • Jimmy Ming-Tai Wu
  • Jeng-Shyang Pan
Conference paper
Part of the Smart Innovation, Systems and Technologies book series (SIST, volume 109)

Abstract

In order to solve the security problem that off-line keyword guessing attacks existed in PEKS or dPEKS scheme, Huang and Li introduced a new security model called PAEKS. In this paper, we show that their scheme didn’t provide “ciphertext indistinguishability” based on some assumptions.

Keywords

PAEKS Ciphertext indistinguishability Security analysis Bilinear pairing 

Notes

Acknowledgments

The work of Chien-Ming Chen was supported in part by the Science and Technology Development Center, Ministry of Education, China under Grant no. 2017A13025 and the Natural Science Foundation of Fujian Province under Grant no. 2018J01636. The work of Chien-Ming was supported in part by Shenzhen Technical Project (JCYJ20170307151750788) and in part by Shenzhen Technical Project (KQJSCX20170327161755).

References

  1. 1.
    Baek, J., Safavi-Naini, R., Susilo, W.: Public key encryption with keyword search revisited. In: International conference on Computational Science and Its Applications, pp. 1249–1259. Springer (2008)Google Scholar
  2. 2.
    Boneh, D., Di Crescenzo, G., Ostrovsky, R., Persiano, G.: Public key encryption with keyword search. In: International Conference on the Theory and Applications of Cryptographic Techniques, pp. 506–522. Springer (2004)Google Scholar
  3. 3.
    Boneh, D., Franklin, M.: Identity-based encryption from the weil pairing. In: Annual International Cryptology Conference, pp. 213–229. Springer (2001)Google Scholar
  4. 4.
    Byun, J.W., Rhee, H.S., Park, H.A., Lee, D.H.: Off-line keyword guessing attacks on recent keyword search schemes over encrypted data. In: Workshop on Secure Data Management, pp. 75–83. Springer (2006)Google Scholar
  5. 5.
    Hu, C., Liu, P.: An enhanced searchable public key encryption scheme with a designated tester and its extensions. J. Comput. 7(3), 716–723 (2012)CrossRefGoogle Scholar
  6. 6.
    Huang, Q., Li, H.: An efficient public-key searchable encryption scheme secure against inside keyword guessing attacks. Inf. Sci. 403, 1–14 (2017)CrossRefGoogle Scholar
  7. 7.
    Li, C.T., Lee, C.C., Weng, C.Y., Wu, T.Y., Chen, C.M.: Cryptanalysis of “an efficient searchable encryption against keyword guessing attacks for shareable electronic medical records in cloud-based system”. In: International Conference on Information Science and Applications, pp. 282–289. Springer (2017)Google Scholar
  8. 8.
    Li, C.T., Wu, T.Y., Chen, C.L., Lee, C.C., Chen, C.M.: An efficient user authentication and user anonymity scheme with provably security for iot-based medical care system. Sensors 17(7), 1482 (2017)CrossRefGoogle Scholar
  9. 9.
    Lu, Y., Wang, G., Li, J., Shen, J.: Efficient designated server identity-based encryption with conjunctive keyword search. Ann. Telecommun. 72(5–6), 359–370 (2017)CrossRefGoogle Scholar
  10. 10.
    Miao, Y., Ma, J., Liu, X., Liu, Z., Zhang, J., Wei, F.: Doas: efficient data owner authorized search over encrypted cloud data. Peer-To-Peer Netw. Appl. 11(3), 349–360 (2018)CrossRefGoogle Scholar
  11. 11.
    Peng, Y., Cui, J., Peng, C., Zuobin, Y.: Certificateless public key encryption with keyword search. China Commun. 11(11), 100–113 (2014)CrossRefGoogle Scholar
  12. 12.
    Rhee, H.S., Park, J.H., Susilo, W., Lee, D.H.: Trapdoor security in a searchable public-key encryption scheme with a designated tester. J. Syst. Softw. 83(5), 763–771 (2010)CrossRefGoogle Scholar
  13. 13.
    Rhee, H.S., Susilo, W., Kim, H.J.: Secure searchable public key encryption scheme against keyword guessing attacks. IEICE Electron. Express 6(5), 237–243 (2009)CrossRefGoogle Scholar
  14. 14.
    Wu, T.Y., Chen, C.M., Wang, K.H., Pan, J.S., Zheng, W., Chu, S.C., Roddick, J.F.: Security analysis of Rhee et al.’s public encryption with keyword search schemes: a review. J. Netw. Intell. 3(1), 16–25 (2018)Google Scholar
  15. 15.
    Wu, T.Y., Meng, C., Chen, C.M., Wang, K.H., Pan, J.S.: On the security of a certificateless public key encryption with keyword search. In: International Conference on Intelligent Information Hiding and Multimedia Signal Processing, pp. 191–197. Springer (2017)Google Scholar
  16. 16.
    Wu, T.Y., Meng, F., Chen, C.M., Liu, S., Pan, J.S.: On the security of a certificateless searchable public key encryption scheme. In: International Conference on Genetic and Evolutionary Computing, pp. 113–119. Springer (2016)Google Scholar
  17. 17.
    Wu, T.Y., Tsai, T.T., Tseng, Y.M.: Efficient searchable id-based encryption with a designated server. Annals of Telecommunications-Annales des Télécommunications 69(7–8), 391–402 (2014)CrossRefGoogle Scholar
  18. 18.
    Wu, T.Y., Tseng, Y.M.: An id-based mutual authentication and key exchange protocol for low-power mobile devices. Comput. J. 53(7), 1062–1070 (2010)CrossRefGoogle Scholar
  19. 19.
    Wu, T.Y., Tseng, Y.M.: A pairing-based publicly verifiable secret sharing scheme. J. Syst. Sci. Complex. 24(1), 186–194 (2011)MathSciNetCrossRefGoogle Scholar
  20. 20.
    Wu, T.Y., Tseng, Y.M.: Publicly verifiable multi-secret sharing scheme from bilinear pairings. IET Inf. Secur. 7(3), 239–246 (2013)CrossRefGoogle Scholar
  21. 21.
    Wu, T.Y., Tseng, Y.M., Tsai, T.T.: A revocable id-based authenticated group key exchange protocol with resistant to malicious participants. Comput. Netw. 56(12), 2994–3006 (2012)CrossRefGoogle Scholar
  22. 22.
    Wu, Y., Lu, X., Su, J., Chen, P.: An efficient searchable encryption against keyword guessing attacks for sharable electronic medical records in cloud-based system. J. Med. Syst. 40(12), 258 (2016)CrossRefGoogle Scholar
  23. 23.
    Yau, W.C., Phan, R.C.W., Heng, S.H., Goi, B.M.: Keyword guessing attacks on secure searchable public key encryption schemes with a designated tester. Int. J. Comput. Math. 90(12), 2581–2587 (2013)CrossRefGoogle Scholar

Copyright information

© Springer Nature Switzerland AG 2019

Authors and Affiliations

  • Tsu-Yang Wu
    • 1
    • 2
  • Chien-Ming Chen
    • 3
  • King-Hang Wang
    • 4
  • Jimmy Ming-Tai Wu
    • 5
  • Jeng-Shyang Pan
    • 1
    • 2
  1. 1.Fujian Provincial Key Lab of Big Data Mining and ApplicationsFujian University of TechnologyFuzhouChina
  2. 2.National Demonstration Center for Experimental Electronic Information and Electrical Technology EducationFujian University of TechnologyFuzhouChina
  3. 3.Harbin Institute of Technology (Shenzhen)ShenzhenChina
  4. 4.Department of Computer Science and EngineeringHong Kong University of Science and TechnologyClear Water BayHong Kong
  5. 5.College of Computer Science and EngineeringShandong University of Science and TechnologyQingdaoChina

Personalised recommendations