Abstract
In order to solve the security problem that off-line keyword guessing attacks existed in PEKS or dPEKS scheme, Huang and Li introduced a new security model called PAEKS. In this paper, we show that their scheme didn’t provide “ciphertext indistinguishability” based on some assumptions.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Baek, J., Safavi-Naini, R., Susilo, W.: Public key encryption with keyword search revisited. In: International conference on Computational Science and Its Applications, pp. 1249–1259. Springer (2008)
Boneh, D., Di Crescenzo, G., Ostrovsky, R., Persiano, G.: Public key encryption with keyword search. In: International Conference on the Theory and Applications of Cryptographic Techniques, pp. 506–522. Springer (2004)
Boneh, D., Franklin, M.: Identity-based encryption from the weil pairing. In: Annual International Cryptology Conference, pp. 213–229. Springer (2001)
Byun, J.W., Rhee, H.S., Park, H.A., Lee, D.H.: Off-line keyword guessing attacks on recent keyword search schemes over encrypted data. In: Workshop on Secure Data Management, pp. 75–83. Springer (2006)
Hu, C., Liu, P.: An enhanced searchable public key encryption scheme with a designated tester and its extensions. J. Comput. 7(3), 716–723 (2012)
Huang, Q., Li, H.: An efficient public-key searchable encryption scheme secure against inside keyword guessing attacks. Inf. Sci. 403, 1–14 (2017)
Li, C.T., Lee, C.C., Weng, C.Y., Wu, T.Y., Chen, C.M.: Cryptanalysis of “an efficient searchable encryption against keyword guessing attacks for shareable electronic medical records in cloud-based system”. In: International Conference on Information Science and Applications, pp. 282–289. Springer (2017)
Li, C.T., Wu, T.Y., Chen, C.L., Lee, C.C., Chen, C.M.: An efficient user authentication and user anonymity scheme with provably security for iot-based medical care system. Sensors 17(7), 1482 (2017)
Lu, Y., Wang, G., Li, J., Shen, J.: Efficient designated server identity-based encryption with conjunctive keyword search. Ann. Telecommun. 72(5–6), 359–370 (2017)
Miao, Y., Ma, J., Liu, X., Liu, Z., Zhang, J., Wei, F.: Doas: efficient data owner authorized search over encrypted cloud data. Peer-To-Peer Netw. Appl. 11(3), 349–360 (2018)
Peng, Y., Cui, J., Peng, C., Zuobin, Y.: Certificateless public key encryption with keyword search. China Commun. 11(11), 100–113 (2014)
Rhee, H.S., Park, J.H., Susilo, W., Lee, D.H.: Trapdoor security in a searchable public-key encryption scheme with a designated tester. J. Syst. Softw. 83(5), 763–771 (2010)
Rhee, H.S., Susilo, W., Kim, H.J.: Secure searchable public key encryption scheme against keyword guessing attacks. IEICE Electron. Express 6(5), 237–243 (2009)
Wu, T.Y., Chen, C.M., Wang, K.H., Pan, J.S., Zheng, W., Chu, S.C., Roddick, J.F.: Security analysis of Rhee et al.’s public encryption with keyword search schemes: a review. J. Netw. Intell. 3(1), 16–25 (2018)
Wu, T.Y., Meng, C., Chen, C.M., Wang, K.H., Pan, J.S.: On the security of a certificateless public key encryption with keyword search. In: International Conference on Intelligent Information Hiding and Multimedia Signal Processing, pp. 191–197. Springer (2017)
Wu, T.Y., Meng, F., Chen, C.M., Liu, S., Pan, J.S.: On the security of a certificateless searchable public key encryption scheme. In: International Conference on Genetic and Evolutionary Computing, pp. 113–119. Springer (2016)
Wu, T.Y., Tsai, T.T., Tseng, Y.M.: Efficient searchable id-based encryption with a designated server. Annals of Telecommunications-Annales des Télécommunications 69(7–8), 391–402 (2014)
Wu, T.Y., Tseng, Y.M.: An id-based mutual authentication and key exchange protocol for low-power mobile devices. Comput. J. 53(7), 1062–1070 (2010)
Wu, T.Y., Tseng, Y.M.: A pairing-based publicly verifiable secret sharing scheme. J. Syst. Sci. Complex. 24(1), 186–194 (2011)
Wu, T.Y., Tseng, Y.M.: Publicly verifiable multi-secret sharing scheme from bilinear pairings. IET Inf. Secur. 7(3), 239–246 (2013)
Wu, T.Y., Tseng, Y.M., Tsai, T.T.: A revocable id-based authenticated group key exchange protocol with resistant to malicious participants. Comput. Netw. 56(12), 2994–3006 (2012)
Wu, Y., Lu, X., Su, J., Chen, P.: An efficient searchable encryption against keyword guessing attacks for sharable electronic medical records in cloud-based system. J. Med. Syst. 40(12), 258 (2016)
Yau, W.C., Phan, R.C.W., Heng, S.H., Goi, B.M.: Keyword guessing attacks on secure searchable public key encryption schemes with a designated tester. Int. J. Comput. Math. 90(12), 2581–2587 (2013)
Acknowledgments
The work of Chien-Ming Chen was supported in part by the Science and Technology Development Center, Ministry of Education, China under Grant no. 2017A13025 and the Natural Science Foundation of Fujian Province under Grant no. 2018J01636. The work of Chien-Ming was supported in part by Shenzhen Technical Project (JCYJ20170307151750788) and in part by Shenzhen Technical Project (KQJSCX20170327161755).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this paper
Cite this paper
Wu, TY., Chen, CM., Wang, KH., Wu, J.MT., Pan, JS. (2019). Security Analysis of a Public Key Authenticated Encryption with Keyword Search Scheme. In: Pan, JS., Ito, A., Tsai, PW., Jain, L. (eds) Recent Advances in Intelligent Information Hiding and Multimedia Signal Processing. IIH-MSP 2018. Smart Innovation, Systems and Technologies, vol 109. Springer, Cham. https://doi.org/10.1007/978-3-030-03745-1_22
Download citation
DOI: https://doi.org/10.1007/978-3-030-03745-1_22
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-03744-4
Online ISBN: 978-3-030-03745-1
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)