Advertisement

Public Key Encryption with Distributed Keyword Search

  • Veronika Kuchta
  • Mark Manulis
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 9565)

Abstract

In this paper we introduce Threshold Public Key Encryption with Keyword Search (TPEKS), a variant of PEKS where the search procedure for encrypted keywords is distributed across multiple servers in a threshold manner. TPEKS schemes offer stronger privacy protection for keywords in comparison to traditional PEKS schemes. In particularly, they prevent keyword guessing attacks by malicious servers. This protection is not achievable in a single-server PEKS setting.

We show how TPEKS can be built generically from any anonymous Identity-Based Threshold Decryption (IBTD), assuming the latter is indistinguishable, anonymous and robust. In order to instantiate our TPEKS construction we describe an efficient IBTD variant of the Boneh-Franklin IBE scheme. We provide an appropriate security model for such IBTD schemes and give an efficient construction in the random oracle model.

TPEKS constructions are particularly useful in distributed cloud storage systems where none of the servers alone is sufficiently trusted to perform the search procedure and where there is a need to split this functionality across multiple servers to enhance security and reliability.

References

  1. 1.
    Abdalla, M., Bellare, M., Catalano, D., Kiltz, E., Kohno, T., Lange, T., Malone-Lee, J., Neven, G., Pailier, P., Shi, H.: Searchable encryption revisited: consistency properties, relation to anonymous IBE and extensions. J. Cryptol. 21, 350–391 (2008)MathSciNetCrossRefMATHGoogle Scholar
  2. 2.
    Abdalla, M., Bellare, M., Neven, G.: Robust encryption. In: Micciancio, D. (ed.) TCC 2010. LNCS, vol. 5978, pp. 480–497. Springer, Heidelberg (2010)CrossRefGoogle Scholar
  3. 3.
    Baek, J., Safavi-Naini, R., Susilo, W.: Public key encryption with keyword search revisited. IACR Cryptology ePrint Archive, p. 191 (2005)Google Scholar
  4. 4.
    Baek, J., Safavi-Naini, R., Susilo, W.: Public key encryption with keyword search revisited. In: Gervasi, O., Murgante, B., Laganà, A., Taniar, D., Mun, Y., Gavrilova, M.L. (eds.) ICCSA 2008, Part I. LNCS, vol. 5072, pp. 1249–1259. Springer, Heidelberg (2008)CrossRefGoogle Scholar
  5. 5.
    Baek, J., Zheng, Y.: Identity-based threshold decryption. In: Bao, F., Deng, R., Zhou, J. (eds.) PKC 2004. LNCS, vol. 2947, pp. 262–276. Springer, Heidelberg (2004)CrossRefGoogle Scholar
  6. 6.
    Benaloh, J., Chase, M., Horvitz, E., Lauter, K.E.: Patient controlled encryption: ensuring privacy of electronic medical records. In: Proceedings of the First ACM Cloud Computing Security Workshop, CCSW 2009, pp. 103–114 (2009)Google Scholar
  7. 7.
    Boneh, D., Di Crescenzo, G., Ostrovsky, R., Persiano, G.: Public key encryption with keyword search. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 506–522. Springer, Heidelberg (2004)CrossRefGoogle Scholar
  8. 8.
    Boneh, D., Franklin, M.: Identity-based encryption from the weil pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 213–229. Springer, Heidelberg (2001)CrossRefGoogle Scholar
  9. 9.
    Boneh, D., Waters, B.: Conjunctive, subset, and range queries on encrypted data. IACR Cryptology ePrint Archive, p. 287 (2006)Google Scholar
  10. 10.
    Byun, J.W., Rhee, H.S., Park, H.-A., Lee, D.-H.: Off-line keyword guessing attacks on recent keyword search schemes over encrypted data. In: Jonker, W., Petković, M. (eds.) SDM 2006. LNCS, vol. 4165, pp. 75–83. Springer, Heidelberg (2006)CrossRefGoogle Scholar
  11. 11.
    Cao, N., Wang, C., Li, M., Ren, K., and Lou, W.: Privacy-preserving multi-keyword ranked search over encrypted cloud data. In: 30th IEEE International Conference on Computer Communications INFOCOM 2011, pp. 829–837 (2011)Google Scholar
  12. 12.
    Chang, Y.-C., Mitzenmacher, M.: Privacy preserving keyword searches on remote encrypted data. In: Ioannidis, J., Keromytis, A.D., Yung, M. (eds.) ACNS 2005. LNCS, vol. 3531, pp. 442–455. Springer, Heidelberg (2005)CrossRefGoogle Scholar
  13. 13.
    Di Crescenzo, G., Saraswat, V.: Public key encryption with searchable keywords based on jacobi symbols. In: Srinathan, K., Rangan, C.P., Yung, M. (eds.) INDOCRYPT 2007. LNCS, vol. 4859, pp. 282–296. Springer, Heidelberg (2007)CrossRefGoogle Scholar
  14. 14.
    Curtmola, R., Garay, J.A., Kamara, S., Ostrovsky, R.: Searchable symmetric encryption: improved definitions and efficient constructions. IACR Cryptology ePrint Archive, p. 210 (2006)Google Scholar
  15. 15.
    Fang, L., Susilo, W., Ge, C., Wang, J.: Public key encryption with keyword search secure against keyword guessing attacks without random oracle. Inf. Sci. 238, 221–241 (2013)MathSciNetCrossRefMATHGoogle Scholar
  16. 16.
    Goh, E.: Secure indexes. IACR Cryptology ePrint Archive, p. 216 (2003)Google Scholar
  17. 17.
    Golle, P., Staddon, J., Waters, B.: Secure conjunctive keyword search over encrypted data. In: Jakobsson, M., Yung, M., Zhou, J. (eds.) ACNS 2004. LNCS, vol. 3089, pp. 31–45. Springer, Heidelberg (2004)CrossRefGoogle Scholar
  18. 18.
    Hwang, Y.-H., Lee, P.J.: Public key encryption with conjunctive keyword search and its extension to a multi-user system. In: Takagi, T., Okamoto, E., Okamoto, T., Okamoto, T. (eds.) Pairing 2007. LNCS, vol. 4575, pp. 2–22. Springer, Heidelberg (2007)CrossRefGoogle Scholar
  19. 19.
    Jeong, I.R., Kwon, J.O., Hong, D., Lee, D.H.: Constructing PEKS schemes secure against keyword guessing attacks is possible? Comput. Commun. 32(2), 394–396 (2009)CrossRefGoogle Scholar
  20. 20.
    Li, M., Lou, W., Ren, K.: Data security and privacy in wireless body area networks. IEEE Wireless Commun. 17(1), 51–58 (2010)CrossRefGoogle Scholar
  21. 21.
    Li, M., Yu, S., Ren, K., Lou, W.: Securing personal health records in cloud computing: patient-centric and fine-grained data access control in multi-owner settings. In: Jajodia, S., Zhou, J. (eds.) SecureComm 2010. LNICST, vol. 50, pp. 89–106. Springer, Heidelberg (2010)CrossRefGoogle Scholar
  22. 22.
    Liu, Q., Wang, G., Wu, J.: Secure and privacy preserving keyword searching for cloud storage services. J. Netw. Comput. Appl. 35(3), 927–933 (2012)CrossRefGoogle Scholar
  23. 23.
    Park, D.J., Kim, K., Lee, P.J.: Public key encryption with conjunctive field keyword search. In: Lim, C.H., Yung, M. (eds.) WISA 2004. LNCS, vol. 3325, pp. 73–86. Springer, Heidelberg (2005)CrossRefGoogle Scholar
  24. 24.
    Rhee, H.S., Susilo, W., Kim, H.: Secure searchable public key encryption scheme against keyword guessing attacks. IEICE Electron Express 6(5), 237–243 (2009)CrossRefGoogle Scholar
  25. 25.
    Sun, W., Wang, B., Cao, N., Li, M., Lou, W., Hou, Y. T., Li, H.: Privacy-preserving multi-keyword text search in the cloud supporting similarity-based ranking. In: 8th ACM Symposium on Information, Computer and Communications Security, ASIA CCS, pp. 71–82. ACM (2013)Google Scholar
  26. 26.
    Swaminathan, A., Mao, Y., Su, G., Gou, H., Varna, A. L., He, S., Wu, M., Oard, D. W.: Confidentiality-preserving rank-ordered search. In: Proceedings of the ACM Workshop on Storage Security and Survivability, StorageSS, pp. 7–12 (2007)Google Scholar
  27. 27.
    van Liesdonk, P., Sedghi, S., Doumen, J., Hartel, P., Jonker, W.: Computationally efficient searchable symmetric encryption. In: Jonker, W., Petković, M. (eds.) SDM 2010. LNCS, vol. 6358, pp. 87–100. Springer, Heidelberg (2010)CrossRefGoogle Scholar
  28. 28.
    Wang, C., Cao, N., Li, J., Ren, K., Lou, W.: Secure ranked keyword search over encrypted cloud data. In: International Conference on Distributed Computing Systems, ICDCS 2010, pp. 253–262. IEEE Computer Society (2010)Google Scholar
  29. 29.
    Wang, C., Cao, N., Ren, K., Lou, W.: Enabling secure and efficient ranked keyword search over outsourced cloud data. IEEE Trans. Parallel Distrib. Syst. 23(8), 1467–1479 (2012)CrossRefGoogle Scholar
  30. 30.
    Zhang, W. Lin, Y., Xiao, S., Liu, Q., Zhou, T.: Secure distributed keyword search in multiple clouds. In: IEEE 22nd International Symposium of Quality of Service, IWQoS 2014, pp. 370–379. IEEE (2014)Google Scholar

Copyright information

© Springer International Publishing Switzerland 2016

Authors and Affiliations

  1. 1.Department of ComputingUniversity of SurreyGuildfordUK

Personalised recommendations