Abstract
Public key encryption with keyword search (PEKS) is a practical cryptographic paradigm that enables one to search for the encrypted data without compromising the security of the original data. It provides a promising solution to the encrypted data retrieval issue in public key cryptosystems. As a combination of PEKS and proxy re-encryption (PRE), proxy re-encryption with keyword search (PRES) allows a semi-trusted proxy to simultaneously re-encrypt and search a delegator’s encrypted data. So far, several PRES schemes have been proposed in the literature. However, most of these schemes did not consider the keyword guessing attack. In this paper, we analyze the security of some PRES schemes and demonstrate that they are vulnerable to the keyword guessing attack. The presented attacks show that a malicious proxy can reveal the keyword encoded in any keyword trapdoor generated by these PRES schemes.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Armbrust, M., et al.: A view of cloud computing. Commun. ACM 53(4), 50–58 (2010)
Liu, Q., Cai, W.D., Shen, J., Fu, Z.J., Liu, X.D., Linge, N.: A speculative approach to spatial-temporal efficiency with multi-Objective optimization in a heterogeneous cloud environment. Secur. Commun. Netw. 9(17), 4002–4012 (2016)
Xia, Z.H., Wang, X.H., Zhang, L.G., Qin, Z., Sun, X.M., Ren, K.: A privacy-preserving and copy-deterrence content-based image retrieval scheme in cloud computing. IEEE Trans. Inf. Forensics Secur. 11(11), 2594–2608 (2016)
Fu, Z., Huang, F., Sun, X., Vasilakos, A.V., Yang, C.: Enabling semantic search based on conceptual graphs over encrypted outsourced data. IEEE Trans. Serv. Comput. 12(5), 813–823 (2019)
Song, D.X., Wagner, D., Perrig, A.: Practical techniques for searches on encrypted data. In: IEEE Symposium Security Privacy, pp. 44–55. IEEE, USA (2000)
Zuo, C., Macindoe, J., Yang, S., Steinfeld, R., Liu, J.K.: Trusted boolean search on cloud using searchable symmetric encryption. In: 2016 IEEE Trustcom/BigDataSE/ISPA, pp. 113–120. IEEE, USA (2016)
Xia, Z., Wang, X., Sun, X., Wang, Q.: A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data. IEEE Trans. Parallel Distrib. Syst. 27(2), 340–352 (2015)
Fu, Z., Wu, X., Guan, C., Sun, X., Ren, K.: Toward efficient multi-keyword fuzzy search over encrypted outsourced data with accuracy improvement. IEEE Trans. Inf. Forensics Secur. 11(12), 2706–2716 (2016)
Fu, Z.J., Sun, X.M., Liu, Q., Zhou, L., Shu, J.G.: Achieving efficient cloud search services: multi-keyword ranked search over encrypted cloud data supporting parallel computing. IEICE Trans. Commun. 98.B(1), 190–200 (2015)
Yang, X., Lee, T., Liu, J.K., Huang, X.: Trust enhancement over range search for encrypted data. In: 2016 IEEE Trustcom/BigDataSE/ISPA, pp. 66–73. IEEE, USA (2016)
Curtmola, R., Garay, J., Kamara, S., Ostrovsky, R.: Searchable symmetric encryption: improved definitions and efficient constructions. In: 13th ACM Conference on Computer and Communications Security, pp. 79–88. ACM, USA (2006)
Boneh, D., Di Crescenzo, G., Ostrovsky, R., Persiano, G.: Public key encryption with keyword search. In: Cachin, C., Camenisch J. (eds.) International Conference on Theory and Applications of Cryptographic Techniques, LNCS, vol. 3027, pp. 506–522. Springer, Heidelberg (2004)
Baek, J., Safavi-Naini, R., Susilo, W.: Public key encryption with keyword search revisited. In: Gervasi, O., Murgante, B., Laganà, A., Taniar, D., Mun, Y., Gavrilova, M.L. (eds.) ICCSA 2008. LNCS, vol. 5072, pp. 1249–1259. Springer, Heidelberg (2008). https://doi.org/10.1007/978-3-540-69839-5_96
Rhee, H.S., Park, J.H., Susilo, W., Lee, D.H.: Improved searchable public key encryption with designated tester. In: 4th International Symposium Information, Computer and Communications Security (ASIACCS), pp. 376–379. ACM USA (2009)
Islam, S.K.H., Obaidat, M.S., Rajeev, V., Amin, R.: Design of a certificateless designated server based searchable public key encryption scheme. In: Giri, D., Mohapatra, R.N., Begehr, H., Obaidat, M.S. (eds.) ICMC 2017. CCIS, vol. 655, pp. 3–15. Springer, Singapore (2017). https://doi.org/10.1007/978-981-10-4642-1_1
Hu, C., Liu, P.: A secure searchable public key encryption scheme with a designated tester against keyword guessing attacks and its extension. In: Lin, S., Huang, X. (eds.) CSEE 2011. CCIS, vol. 215, pp. 131–136. Springer, Heidelberg (2011). https://doi.org/10.1007/978-3-642-23324-1_23
Lu, Y., Wang, G., Li, J., Shen, J.: Efficient designated server identity-based encryption with conjunctive keywords search. Ann. Telecommun. 72(5–6), 359–370 (2017)
Guo, L.F., Yau, W.C.: Efficient secure-channel free public key encryption with keyword search for EMRs in cloud storage. J. Med. Syst. 39(2), 11 (2015)
Zhou, Y., Xu, G., Wang, Y.: Chaotic map-based time-aware multi-keyword search scheme with designated server. Wireless Commun. Mob. Comput. 16(3), 1851–1858 (2016)
Wang, H.J., Dong, X., Cao, Z.: Secure and efficient encrypted keyword search for multi-user setting in cloud computing. Peer-to-Peer Netw. Appl. 12(1), 32–42 (2019)
Hamlin, A., Shelat, A., Weiss, M., Wichs, D.: Multi-key searchable encryption, revisited. In: Abdalla, M., Dahab, R. (eds.) PKC 2018. LNCS, vol. 10769, pp. 95–124. Springer, Cham (2018). https://doi.org/10.1007/978-3-319-76578-5_4
Abdalla, M., et al.: Searchable encryption revisited: consistency properties, relation to anonymous IBE, and extensions. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 205–222. Springer, Heidelberg (2005). https://doi.org/10.1007/11535218_13
Rhee, H.S., Park, J.H., Susilo, W., Lee, D.H.: Trapdoor security in a searchable public-key encryption scheme with a designated tester. J. Syst. Softw. 83(5), 763–771 (2010)
Blaze, M., Bleumer, G., Strauss, M.: Divertible protocols and atomic proxy cryptography. In: Nyberg, K. (ed.) EUROCRYPT 1998. LNCS, vol. 1403, pp. 127–144. Springer, Heidelberg (1998). https://doi.org/10.1007/BFb0054122
Shao, Z., Yang, B.: On security against the server in designated tester public key encryption with keyword search. Inf. Process. Lett. 115(12), 957–961 (2015)
Hong, H., Sun, Z.: Towards secure data sharing in cloud computing using attribute based proxy re-encryption with keyword search. In: ICCCBDA 2017, pp. 218–223. IEEE, USA (2017)
Yang, Y., Ma, M.: Conjunctive keyword search with designated tester and timing enabled proxy re-encryption function for e-health clouds. IEEE Trans. Inf. Forensics Secur. 11(4), 746–759 (2017)
Yang, Y., Zheng, X.H., Chang, V., Tang, C.M.: Semantic keyword searchable proxy re‐encryption for postquantum secure cloud storage. Concurrency Comput. Pract. Experience 29(19), e4211 (2017)
Lee, S.H., Lee, I.Y.: A study of practical proxy re-encryption with a keyword search scheme considering cloud storage structure. Scientific World Journal 2014, Article ID 615679 (2014)
Guo, L., Lu, B., Li, X., Xu, H.: A verifiable proxy re-encryption with keyword search without random oracle. In: 2013 Ninth International Conference on Computational Intelligence and Security, pp. 474–478. IEEE, USA (2013)
Chen, X., Li, Y.: Efficient proxy re-encryption with private keyword searching in untrusted storage. Int. J. Comput. Netw. Inform. Secur. 3(2), 50–56 (2011)
Wang, X.A., Huang, X., Yang, X.Y., Liu, L.F., Wu, X.G.: Further observation on proxy re-encryption with keyword search. J. Syst. Softw. 85(3), 643–654 (2012)
Fang, L.M., Susilo, W., Ge, C.P., Wang, J.D.: Chosen-ciphertext secure anonymous conditional proxy re-encryption with keyword search. Theoret. Comput. Sci. 462(1), 39–58 (2012)
Chen, Z.H., Li, S.D., Huang, Q., Wang, Y.L., Zhou. S.F.: A restricted proxy re-encryption with keyword search for fine-grained data access control in cloud storage. Concurrency Comput. Pract. Exper. 28(10), 2858–2876 (2016)
Wu, Y., Lu, X., Su, J., Chen, P.: An efficient searchable encryption against keyword guessing attacks for sharable electronic medical records in cloud-based system. J. Med. Syst. 40(12), 258 (2016)
Byun, J.W., Rhee, H.S., Park, H.-A., Lee, D.H.: Off-line keyword guessing attacks on recent keyword search schemes over encrypted data. In: Jonker, W., Petković, M. (eds.) SDM 2006. LNCS, vol. 4165, pp. 75–83. Springer, Heidelberg (2006). https://doi.org/10.1007/11844662_6
Yau, W.C., Phan, R.C., Heng, S.H., Goi, B.M.: Keyword guessing attacks on secure searchable public key encryption schemes with a designated tester. Int. J. Comput. Math. 90(12), 2581–2587 (2013)
Yau, W.-C., Heng, S.-H., Goi, B.-M.: Off-line keyword guessing attacks on recent public key encryption with keyword search schemes. In: Rong, C., Jaatun, M.G., Sandnes, F.E., Yang, L.T., Ma, J. (eds.) ATC 2008. LNCS, vol. 5060, pp. 100–105. Springer, Heidelberg (2008). https://doi.org/10.1007/978-3-540-69295-9_10
Sun, L.X., Xu, C.X., Zhang, M.W., Chen, K.F., Li, H.W.: Secure searchable public key encryption against insider keyword guessing attacks from indistinguishability obfuscation. Sci. Chin. Inform. Sci. 61(3), 228–230 (2018)
Ni, J.B., Yu, Y., Xia, Q., Niu, L.: Cryptanalysis of two searchable public key encryption schemes with a designated tester. J Inform. Comput. Sci. 9(16), 4819–4825 (2012)
Shao, Z., Yang, B.: On security against the server in designated tester public key encryption with keyword search. Inform. Process. Lett. 115(12), 957–961 (2015)
Lu, Y., Wang, G., Li, J.G.: On security of a secure channel free public key encryption with conjunctive field keyword search scheme. J. Inform. Technol. Control 47(1), 56–62 (2018)
Acknowledgments
This work was supported in part by the National Natural Science Foundation of China under Grant Nos. 61772009, 61972095, 62072104 and U1736112, the Natural Science Foundation of Jiangsu Province under Grant No. BK20181304.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 Springer Nature Switzerland AG
About this paper
Cite this paper
Yu, X., Lu, Y., Tian, J., Wang, F. (2021). Keyword Guessing Attacks on Some Proxy Re-Encryption with Keyword Search Schemes. In: Sun, X., Zhang, X., Xia, Z., Bertino, E. (eds) Artificial Intelligence and Security. ICAIS 2021. Lecture Notes in Computer Science(), vol 12737. Springer, Cham. https://doi.org/10.1007/978-3-030-78612-0_21
Download citation
DOI: https://doi.org/10.1007/978-3-030-78612-0_21
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-78611-3
Online ISBN: 978-3-030-78612-0
eBook Packages: Computer ScienceComputer Science (R0)