Advertisement

A Fast Public Key Searchable Encryption Scheme Against Inside Keyword Attacks

  • Can Liu
  • Ningjiang Chen
  • Ruwei HuangEmail author
  • Yongsheng Xie
Conference paper
Part of the Communications in Computer and Information Science book series (CCIS, volume 1042)

Abstract

With the advent of the era of cloud computing technology, the security and search efficiency of ciphertext retrieval have has become the focus of research. However, in the traditional encryption schemes, most of them only solve the problem of defending against external keyword guessing attacks. We tend to ignore malicious third party cloud server provider, which sometimes tries to guess the user’s ciphertext information through the trapdoor or keywords. For the sake of improving the security of ciphertext, an inside keyword attack scheme on the basis of inverted index is proposed. Firstly, When building inverted indexes, the private key of the data owner is added to protect against the attack of malicious server. Secondly, an efficient public key ciphertext search scheme of parallel encryption index structure is introduced to realize the parallel search task of keywords. Compared with the traditional public-key searchable encryption, our scheme not only improves the search efficiency but also improves the security of the system.

Keywords

Inside keyword attack Malicious server Parallel search Ciphertext search 

Notes

Acknowledgment

This work is supported by the National Natural Science Foundation of China (61762008) and the Natural Science Foundation Project of Guangxi (2016GXNSFAA 380115).

References

  1. 1.
    Song, D.X., Wagner, D., Perrig, A.: Practical techniques for searches on encrypted data. In: Proceeding 2000 IEEE Symposium on Security and Privacy, pp. 44–55. IEEE (2000)Google Scholar
  2. 2.
    Boneh, D., Di Crescenzo, G., Ostrovsky, R., Persiano, G.: Public key encryption with keyword search. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 506–522. Springer, Heidelberg (2004).  https://doi.org/10.1007/978-3-540-24676-3_30CrossRefGoogle Scholar
  3. 3.
    Byun, J.W., Rhee, H.S., Park, H.A., Lee, D.H.: Off-line keyword guessing attacks on recent keyword search schemes over encrypted data. In: Jonker, W., Petković, M. (eds.) SDM 2006. LNCS, vol. 4165, pp. 75–83. Springer, Heidelberg (2006).  https://doi.org/10.1007/11844662_6CrossRefGoogle Scholar
  4. 4.
    Rhee, H.S., Park, J.H., Susilo, W.: Trapdoor security in a searchable public-key encryption scheme with a designated tester. J. Syst. Softw. 83(5), 763–771 (2010)CrossRefGoogle Scholar
  5. 5.
    Wang, B., Song, W., Lou, W., Hou, Y.T.: Inverted index based multi-keyword public-key searchable encryption with strong privacy guarantee. In: 2015 IEEE Conference on Computer Communications (INFOCOM), pp. 2092–2100. IEEE (2015)Google Scholar
  6. 6.
    Yanguo, P., Jiangtao, C., Changgen, P., Zuobin, Y.: Certificateless public key encryption with keyword search. China Commun. 11(11), 100–113 (2015)CrossRefGoogle Scholar
  7. 7.
    Huang, Q., Li, H.: An efficient public-key searchable encryption scheme secure against inside keyword guessing attacks. Inf. Sci. 403, 1–14 (2017)CrossRefGoogle Scholar
  8. 8.
    Wang, C.H., Tu, T.Y.: Keyword search encryption scheme resistant against keyword-guessing attack by the untrusted server. J. Shanghai Jiaotong Univ. (Sci.) 19(4), 440–442 (2014)CrossRefGoogle Scholar
  9. 9.
    Fang, L., Susilo, W., Ge, C., Wang, J.: Public key encryption with keyword search secure against keyword guessing attacks without random oracle. Inf. Sci. 238, 221–241 (2013)MathSciNetCrossRefGoogle Scholar
  10. 10.
    Yau, W.C., Heng, S.H., Goi, B.M.: Off-line keyword guessing attacks on recent public key encryption with keyword search schemes. In: Rong, C., Jaatun, M.G., Sandnes, F.E., Yang, L.T., Ma, J. (eds.) ATC 2008. LNCS, vol. 5060, pp. 100–105. Springer, Heidelberg (2008).  https://doi.org/10.1007/978-3-540-69295-9_10CrossRefGoogle Scholar
  11. 11.
    Sun, L., Xu, C., Zhang, M., Chen, K., Li, H.: Secure searchable public key encryption against insider keyword guessing attacks from indistinguishability obfuscation. Sci. China Inf. Sci. 61(3), 038106:1–038106:3 (2018)CrossRefGoogle Scholar
  12. 12.
    Zhang, R., Xue, R., Yu, T., Liu, L.: Dynamic and efficient private keyword search over inverted index–based encrypted data. ACM Trans. Internet Technol. 16(3), 21 (2016)CrossRefGoogle Scholar
  13. 13.
    Song, D.X., Wagner, D., Perrig, A.: Practical techniques for searches on encrypted data. In: Proceeding 2000 IEEE Symposium on Security and Privacy, pp. 44–55. IEEE (2000)Google Scholar
  14. 14.
    Lynn, B.: PBC Library. https://crypto.stanford.edu/pbc/
  15. 15.
    Xu, P., Tang, X., Wang, W., Jin, H., Yang, L.T.: Fast and parallel keyword search over public-key ciphertexts for cloud-assisted IoT. IEEE Access 5, 24775–24784 (2017)CrossRefGoogle Scholar
  16. 16.
    Wang, B., Song, W., Lou, W., Hou, Y.T.: Inverted index based multi-keyword public-key searchable encryption with strong privacy guarantee. In: 2015 IEEE Conference on Computer Communications (INFOCOM), pp. 2092–2100. IEEE (2015)Google Scholar
  17. 17.
    Chen, R., Mu, Y., Yang, G., Guo, F., Wang, X.: Dual-server public-key encryption with keyword search for secure cloud storage. IEEE Trans. Inf. Forensics Secur. 11(4), 789–798 (2015)Google Scholar
  18. 18.
    Saito, T., Nakanishi, T.: Designated-senders public-key searchable encryption secure against keyword guessing attacks. In: 2017 Fifth International Symposium on Computing and Networking (CANDAR), pp. 496–502. IEEE (2017)Google Scholar
  19. 19.
    Xu, P., Wu, Q., Wang, W., Susilo, W., Domingo-Ferrer, J., Jin, H.: Generating searchable public-key ciphertexts with hidden structures for fast keyword search. IEEE Trans. Inf. Forensics Secur. 10(9), 1993–2006 (2015)CrossRefGoogle Scholar
  20. 20.
    Ding, S., Li, Y., Zhang, J., Chen, L., Wang, Z., Xu, Q.: An efficient and privacy-preserving ranked fuzzy keywords search over encrypted cloud data. In: 2016 International Conference on Behavioral, Economic and Socio-cultural Computing (BESC), pp. 1–6. IEEE (2016)Google Scholar
  21. 21.
    Du, M., Wang, Q., He, M., Weng, J.: Privacy-preserving indexing and query processing for secure dynamic cloud storage. IEEE Trans. Inf. Forensics Secur. 13(9), 2320–2332 (2018)CrossRefGoogle Scholar
  22. 22.
    Shao, Z.Y., Yang, B.: On security against the server in designated tester public key encryption with keyword search. Formation Process. Lett. 115(12), 957–961 (2015)MathSciNetCrossRefGoogle Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2019

Authors and Affiliations

  • Can Liu
    • 1
  • Ningjiang Chen
    • 1
    • 2
  • Ruwei Huang
    • 1
    • 2
    Email author
  • Yongsheng Xie
    • 1
  1. 1.School of Computer and Electronic InformationGuangxi UniversityNanningChina
  2. 2.Guangxi Key Laboratory of Multimedia Communications and Network TechnologyNanningChina

Personalised recommendations