Skip to main content

Keyword Guessing Attacks on Some Proxy Re-Encryption with Keyword Search Schemes

  • Conference paper
  • First Online:
Artificial Intelligence and Security (ICAIS 2021)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 12737))

Included in the following conference series:

  • 1469 Accesses

Abstract

Public key encryption with keyword search (PEKS) is a practical cryptographic paradigm that enables one to search for the encrypted data without compromising the security of the original data. It provides a promising solution to the encrypted data retrieval issue in public key cryptosystems. As a combination of PEKS and proxy re-encryption (PRE), proxy re-encryption with keyword search (PRES) allows a semi-trusted proxy to simultaneously re-encrypt and search a delegator’s encrypted data. So far, several PRES schemes have been proposed in the literature. However, most of these schemes did not consider the keyword guessing attack. In this paper, we analyze the security of some PRES schemes and demonstrate that they are vulnerable to the keyword guessing attack. The presented attacks show that a malicious proxy can reveal the keyword encoded in any keyword trapdoor generated by these PRES schemes.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Armbrust, M., et al.: A view of cloud computing. Commun. ACM 53(4), 50–58 (2010)

    Article  Google Scholar 

  2. Liu, Q., Cai, W.D., Shen, J., Fu, Z.J., Liu, X.D., Linge, N.: A speculative approach to spatial-temporal efficiency with multi-Objective optimization in a heterogeneous cloud environment. Secur. Commun. Netw. 9(17), 4002–4012 (2016)

    Article  Google Scholar 

  3. Xia, Z.H., Wang, X.H., Zhang, L.G., Qin, Z., Sun, X.M., Ren, K.: A privacy-preserving and copy-deterrence content-based image retrieval scheme in cloud computing. IEEE Trans. Inf. Forensics Secur. 11(11), 2594–2608 (2016)

    Article  Google Scholar 

  4. Fu, Z., Huang, F., Sun, X., Vasilakos, A.V., Yang, C.: Enabling semantic search based on conceptual graphs over encrypted outsourced data. IEEE Trans. Serv. Comput. 12(5), 813–823 (2019)

    Article  Google Scholar 

  5. Song, D.X., Wagner, D., Perrig, A.: Practical techniques for searches on encrypted data. In: IEEE Symposium Security Privacy, pp. 44–55. IEEE, USA (2000)

    Google Scholar 

  6. Zuo, C., Macindoe, J., Yang, S., Steinfeld, R., Liu, J.K.: Trusted boolean search on cloud using searchable symmetric encryption. In: 2016 IEEE Trustcom/BigDataSE/ISPA, pp. 113–120. IEEE, USA (2016)

    Google Scholar 

  7. Xia, Z., Wang, X., Sun, X., Wang, Q.: A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data. IEEE Trans. Parallel Distrib. Syst. 27(2), 340–352 (2015)

    Article  Google Scholar 

  8. Fu, Z., Wu, X., Guan, C., Sun, X., Ren, K.: Toward efficient multi-keyword fuzzy search over encrypted outsourced data with accuracy improvement. IEEE Trans. Inf. Forensics Secur. 11(12), 2706–2716 (2016)

    Article  Google Scholar 

  9. Fu, Z.J., Sun, X.M., Liu, Q., Zhou, L., Shu, J.G.: Achieving efficient cloud search services: multi-keyword ranked search over encrypted cloud data supporting parallel computing. IEICE Trans. Commun. 98.B(1), 190–200 (2015)

    Google Scholar 

  10. Yang, X., Lee, T., Liu, J.K., Huang, X.: Trust enhancement over range search for encrypted data. In: 2016 IEEE Trustcom/BigDataSE/ISPA, pp. 66–73. IEEE, USA (2016)

    Google Scholar 

  11. Curtmola, R., Garay, J., Kamara, S., Ostrovsky, R.: Searchable symmetric encryption: improved definitions and efficient constructions. In: 13th ACM Conference on Computer and Communications Security, pp. 79–88. ACM, USA (2006)

    Google Scholar 

  12. Boneh, D., Di Crescenzo, G., Ostrovsky, R., Persiano, G.: Public key encryption with keyword search. In: Cachin, C., Camenisch J. (eds.) International Conference on Theory and Applications of Cryptographic Techniques, LNCS, vol. 3027, pp. 506–522. Springer, Heidelberg (2004)

    Google Scholar 

  13. Baek, J., Safavi-Naini, R., Susilo, W.: Public key encryption with keyword search revisited. In: Gervasi, O., Murgante, B., Laganà, A., Taniar, D., Mun, Y., Gavrilova, M.L. (eds.) ICCSA 2008. LNCS, vol. 5072, pp. 1249–1259. Springer, Heidelberg (2008). https://doi.org/10.1007/978-3-540-69839-5_96

    Chapter  Google Scholar 

  14. Rhee, H.S., Park, J.H., Susilo, W., Lee, D.H.: Improved searchable public key encryption with designated tester. In: 4th International Symposium Information, Computer and Communications Security (ASIACCS), pp. 376–379. ACM USA (2009)

    Google Scholar 

  15. Islam, S.K.H., Obaidat, M.S., Rajeev, V., Amin, R.: Design of a certificateless designated server based searchable public key encryption scheme. In: Giri, D., Mohapatra, R.N., Begehr, H., Obaidat, M.S. (eds.) ICMC 2017. CCIS, vol. 655, pp. 3–15. Springer, Singapore (2017). https://doi.org/10.1007/978-981-10-4642-1_1

    Chapter  Google Scholar 

  16. Hu, C., Liu, P.: A secure searchable public key encryption scheme with a designated tester against keyword guessing attacks and its extension. In: Lin, S., Huang, X. (eds.) CSEE 2011. CCIS, vol. 215, pp. 131–136. Springer, Heidelberg (2011). https://doi.org/10.1007/978-3-642-23324-1_23

    Chapter  Google Scholar 

  17. Lu, Y., Wang, G., Li, J., Shen, J.: Efficient designated server identity-based encryption with conjunctive keywords search. Ann. Telecommun. 72(5–6), 359–370 (2017)

    Article  Google Scholar 

  18. Guo, L.F., Yau, W.C.: Efficient secure-channel free public key encryption with keyword search for EMRs in cloud storage. J. Med. Syst. 39(2), 11 (2015)

    Article  Google Scholar 

  19. Zhou, Y., Xu, G., Wang, Y.: Chaotic map-based time-aware multi-keyword search scheme with designated server. Wireless Commun. Mob. Comput. 16(3), 1851–1858 (2016)

    Article  Google Scholar 

  20. Wang, H.J., Dong, X., Cao, Z.: Secure and efficient encrypted keyword search for multi-user setting in cloud computing. Peer-to-Peer Netw. Appl. 12(1), 32–42 (2019)

    Article  Google Scholar 

  21. Hamlin, A., Shelat, A., Weiss, M., Wichs, D.: Multi-key searchable encryption, revisited. In: Abdalla, M., Dahab, R. (eds.) PKC 2018. LNCS, vol. 10769, pp. 95–124. Springer, Cham (2018). https://doi.org/10.1007/978-3-319-76578-5_4

    Chapter  MATH  Google Scholar 

  22. Abdalla, M., et al.: Searchable encryption revisited: consistency properties, relation to anonymous IBE, and extensions. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 205–222. Springer, Heidelberg (2005). https://doi.org/10.1007/11535218_13

    Chapter  Google Scholar 

  23. Rhee, H.S., Park, J.H., Susilo, W., Lee, D.H.: Trapdoor security in a searchable public-key encryption scheme with a designated tester. J. Syst. Softw. 83(5), 763–771 (2010)

    Article  Google Scholar 

  24. Blaze, M., Bleumer, G., Strauss, M.: Divertible protocols and atomic proxy cryptography. In: Nyberg, K. (ed.) EUROCRYPT 1998. LNCS, vol. 1403, pp. 127–144. Springer, Heidelberg (1998). https://doi.org/10.1007/BFb0054122

    Chapter  Google Scholar 

  25. Shao, Z., Yang, B.: On security against the server in designated tester public key encryption with keyword search. Inf. Process. Lett. 115(12), 957–961 (2015)

    Article  MathSciNet  Google Scholar 

  26. Hong, H., Sun, Z.: Towards secure data sharing in cloud computing using attribute based proxy re-encryption with keyword search. In: ICCCBDA 2017, pp. 218–223. IEEE, USA (2017)

    Google Scholar 

  27. Yang, Y., Ma, M.: Conjunctive keyword search with designated tester and timing enabled proxy re-encryption function for e-health clouds. IEEE Trans. Inf. Forensics Secur. 11(4), 746–759 (2017)

    Google Scholar 

  28. Yang, Y., Zheng, X.H., Chang, V., Tang, C.M.: Semantic keyword searchable proxy re‐encryption for postquantum secure cloud storage. Concurrency Comput. Pract. Experience 29(19), e4211 (2017)

    Google Scholar 

  29. Lee, S.H., Lee, I.Y.: A study of practical proxy re-encryption with a keyword search scheme considering cloud storage structure. Scientific World Journal 2014, Article ID 615679 (2014)

    Google Scholar 

  30. Guo, L., Lu, B., Li, X., Xu, H.: A verifiable proxy re-encryption with keyword search without random oracle. In: 2013 Ninth International Conference on Computational Intelligence and Security, pp. 474–478. IEEE, USA (2013)

    Google Scholar 

  31. Chen, X., Li, Y.: Efficient proxy re-encryption with private keyword searching in untrusted storage. Int. J. Comput. Netw. Inform. Secur. 3(2), 50–56 (2011)

    Google Scholar 

  32. Wang, X.A., Huang, X., Yang, X.Y., Liu, L.F., Wu, X.G.: Further observation on proxy re-encryption with keyword search. J. Syst. Softw. 85(3), 643–654 (2012)

    Article  Google Scholar 

  33. Fang, L.M., Susilo, W., Ge, C.P., Wang, J.D.: Chosen-ciphertext secure anonymous conditional proxy re-encryption with keyword search. Theoret. Comput. Sci. 462(1), 39–58 (2012)

    Article  MathSciNet  Google Scholar 

  34. Chen, Z.H., Li, S.D., Huang, Q., Wang, Y.L., Zhou. S.F.: A restricted proxy re-encryption with keyword search for fine-grained data access control in cloud storage. Concurrency Comput. Pract. Exper. 28(10), 2858–2876 (2016)

    Google Scholar 

  35. Wu, Y., Lu, X., Su, J., Chen, P.: An efficient searchable encryption against keyword guessing attacks for sharable electronic medical records in cloud-based system. J. Med. Syst. 40(12), 258 (2016)

    Article  Google Scholar 

  36. Byun, J.W., Rhee, H.S., Park, H.-A., Lee, D.H.: Off-line keyword guessing attacks on recent keyword search schemes over encrypted data. In: Jonker, W., Petković, M. (eds.) SDM 2006. LNCS, vol. 4165, pp. 75–83. Springer, Heidelberg (2006). https://doi.org/10.1007/11844662_6

    Chapter  Google Scholar 

  37. Yau, W.C., Phan, R.C., Heng, S.H., Goi, B.M.: Keyword guessing attacks on secure searchable public key encryption schemes with a designated tester. Int. J. Comput. Math. 90(12), 2581–2587 (2013)

    Article  Google Scholar 

  38. Yau, W.-C., Heng, S.-H., Goi, B.-M.: Off-line keyword guessing attacks on recent public key encryption with keyword search schemes. In: Rong, C., Jaatun, M.G., Sandnes, F.E., Yang, L.T., Ma, J. (eds.) ATC 2008. LNCS, vol. 5060, pp. 100–105. Springer, Heidelberg (2008). https://doi.org/10.1007/978-3-540-69295-9_10

    Chapter  Google Scholar 

  39. Sun, L.X., Xu, C.X., Zhang, M.W., Chen, K.F., Li, H.W.: Secure searchable public key encryption against insider keyword guessing attacks from indistinguishability obfuscation. Sci. Chin. Inform. Sci. 61(3), 228–230 (2018)

    Article  Google Scholar 

  40. Ni, J.B., Yu, Y., Xia, Q., Niu, L.: Cryptanalysis of two searchable public key encryption schemes with a designated tester. J Inform. Comput. Sci. 9(16), 4819–4825 (2012)

    Google Scholar 

  41. Shao, Z., Yang, B.: On security against the server in designated tester public key encryption with keyword search. Inform. Process. Lett. 115(12), 957–961 (2015)

    Article  MathSciNet  Google Scholar 

  42. Lu, Y., Wang, G., Li, J.G.: On security of a secure channel free public key encryption with conjunctive field keyword search scheme. J. Inform. Technol. Control 47(1), 56–62 (2018)

    Google Scholar 

Download references

Acknowledgments

This work was supported in part by the National Natural Science Foundation of China under Grant Nos. 61772009, 61972095, 62072104 and U1736112, the Natural Science Foundation of Jiangsu Province under Grant No. BK20181304.

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Yu, X., Lu, Y., Tian, J., Wang, F. (2021). Keyword Guessing Attacks on Some Proxy Re-Encryption with Keyword Search Schemes. In: Sun, X., Zhang, X., Xia, Z., Bertino, E. (eds) Artificial Intelligence and Security. ICAIS 2021. Lecture Notes in Computer Science(), vol 12737. Springer, Cham. https://doi.org/10.1007/978-3-030-78612-0_21

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-78612-0_21

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-78611-3

  • Online ISBN: 978-3-030-78612-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics