Skip to main content

Security Analysis of a Public Key Authenticated Encryption with Keyword Search Scheme

  • Conference paper
  • First Online:
Recent Advances in Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2018)

Abstract

In order to solve the security problem that off-line keyword guessing attacks existed in PEKS or dPEKS scheme, Huang and Li introduced a new security model called PAEKS. In this paper, we show that their scheme didn’t provide “ciphertext indistinguishability” based on some assumptions.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Baek, J., Safavi-Naini, R., Susilo, W.: Public key encryption with keyword search revisited. In: International conference on Computational Science and Its Applications, pp. 1249–1259. Springer (2008)

    Google Scholar 

  2. Boneh, D., Di Crescenzo, G., Ostrovsky, R., Persiano, G.: Public key encryption with keyword search. In: International Conference on the Theory and Applications of Cryptographic Techniques, pp. 506–522. Springer (2004)

    Google Scholar 

  3. Boneh, D., Franklin, M.: Identity-based encryption from the weil pairing. In: Annual International Cryptology Conference, pp. 213–229. Springer (2001)

    Google Scholar 

  4. Byun, J.W., Rhee, H.S., Park, H.A., Lee, D.H.: Off-line keyword guessing attacks on recent keyword search schemes over encrypted data. In: Workshop on Secure Data Management, pp. 75–83. Springer (2006)

    Google Scholar 

  5. Hu, C., Liu, P.: An enhanced searchable public key encryption scheme with a designated tester and its extensions. J. Comput. 7(3), 716–723 (2012)

    Article  Google Scholar 

  6. Huang, Q., Li, H.: An efficient public-key searchable encryption scheme secure against inside keyword guessing attacks. Inf. Sci. 403, 1–14 (2017)

    Article  Google Scholar 

  7. Li, C.T., Lee, C.C., Weng, C.Y., Wu, T.Y., Chen, C.M.: Cryptanalysis of “an efficient searchable encryption against keyword guessing attacks for shareable electronic medical records in cloud-based system”. In: International Conference on Information Science and Applications, pp. 282–289. Springer (2017)

    Google Scholar 

  8. Li, C.T., Wu, T.Y., Chen, C.L., Lee, C.C., Chen, C.M.: An efficient user authentication and user anonymity scheme with provably security for iot-based medical care system. Sensors 17(7), 1482 (2017)

    Article  Google Scholar 

  9. Lu, Y., Wang, G., Li, J., Shen, J.: Efficient designated server identity-based encryption with conjunctive keyword search. Ann. Telecommun. 72(5–6), 359–370 (2017)

    Article  Google Scholar 

  10. Miao, Y., Ma, J., Liu, X., Liu, Z., Zhang, J., Wei, F.: Doas: efficient data owner authorized search over encrypted cloud data. Peer-To-Peer Netw. Appl. 11(3), 349–360 (2018)

    Article  Google Scholar 

  11. Peng, Y., Cui, J., Peng, C., Zuobin, Y.: Certificateless public key encryption with keyword search. China Commun. 11(11), 100–113 (2014)

    Article  Google Scholar 

  12. Rhee, H.S., Park, J.H., Susilo, W., Lee, D.H.: Trapdoor security in a searchable public-key encryption scheme with a designated tester. J. Syst. Softw. 83(5), 763–771 (2010)

    Article  Google Scholar 

  13. Rhee, H.S., Susilo, W., Kim, H.J.: Secure searchable public key encryption scheme against keyword guessing attacks. IEICE Electron. Express 6(5), 237–243 (2009)

    Article  Google Scholar 

  14. Wu, T.Y., Chen, C.M., Wang, K.H., Pan, J.S., Zheng, W., Chu, S.C., Roddick, J.F.: Security analysis of Rhee et al.’s public encryption with keyword search schemes: a review. J. Netw. Intell. 3(1), 16–25 (2018)

    Google Scholar 

  15. Wu, T.Y., Meng, C., Chen, C.M., Wang, K.H., Pan, J.S.: On the security of a certificateless public key encryption with keyword search. In: International Conference on Intelligent Information Hiding and Multimedia Signal Processing, pp. 191–197. Springer (2017)

    Google Scholar 

  16. Wu, T.Y., Meng, F., Chen, C.M., Liu, S., Pan, J.S.: On the security of a certificateless searchable public key encryption scheme. In: International Conference on Genetic and Evolutionary Computing, pp. 113–119. Springer (2016)

    Google Scholar 

  17. Wu, T.Y., Tsai, T.T., Tseng, Y.M.: Efficient searchable id-based encryption with a designated server. Annals of Telecommunications-Annales des Télécommunications 69(7–8), 391–402 (2014)

    Article  Google Scholar 

  18. Wu, T.Y., Tseng, Y.M.: An id-based mutual authentication and key exchange protocol for low-power mobile devices. Comput. J. 53(7), 1062–1070 (2010)

    Article  Google Scholar 

  19. Wu, T.Y., Tseng, Y.M.: A pairing-based publicly verifiable secret sharing scheme. J. Syst. Sci. Complex. 24(1), 186–194 (2011)

    Article  MathSciNet  Google Scholar 

  20. Wu, T.Y., Tseng, Y.M.: Publicly verifiable multi-secret sharing scheme from bilinear pairings. IET Inf. Secur. 7(3), 239–246 (2013)

    Article  Google Scholar 

  21. Wu, T.Y., Tseng, Y.M., Tsai, T.T.: A revocable id-based authenticated group key exchange protocol with resistant to malicious participants. Comput. Netw. 56(12), 2994–3006 (2012)

    Article  Google Scholar 

  22. Wu, Y., Lu, X., Su, J., Chen, P.: An efficient searchable encryption against keyword guessing attacks for sharable electronic medical records in cloud-based system. J. Med. Syst. 40(12), 258 (2016)

    Article  Google Scholar 

  23. Yau, W.C., Phan, R.C.W., Heng, S.H., Goi, B.M.: Keyword guessing attacks on secure searchable public key encryption schemes with a designated tester. Int. J. Comput. Math. 90(12), 2581–2587 (2013)

    Article  Google Scholar 

Download references

Acknowledgments

The work of Chien-Ming Chen was supported in part by the Science and Technology Development Center, Ministry of Education, China under Grant no. 2017A13025 and the Natural Science Foundation of Fujian Province under Grant no. 2018J01636. The work of Chien-Ming was supported in part by Shenzhen Technical Project (JCYJ20170307151750788) and in part by Shenzhen Technical Project (KQJSCX20170327161755).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Chien-Ming Chen .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Wu, TY., Chen, CM., Wang, KH., Wu, J.MT., Pan, JS. (2019). Security Analysis of a Public Key Authenticated Encryption with Keyword Search Scheme. In: Pan, JS., Ito, A., Tsai, PW., Jain, L. (eds) Recent Advances in Intelligent Information Hiding and Multimedia Signal Processing. IIH-MSP 2018. Smart Innovation, Systems and Technologies, vol 109. Springer, Cham. https://doi.org/10.1007/978-3-030-03745-1_22

Download citation

Publish with us

Policies and ethics