Skip to main content

On the Security of a Certificateless Public Key Encryption with Keyword Search

  • Conference paper
  • First Online:
Advances in Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2017)

Abstract

Public key encryption with keyword search (PEKS) is one of searchable encryption mechanisms. It not only provides user to retrieve ciphertext by keyword but also protects the confidentiality of keyword. In the past, many PEKS schemes based on different cryptosystems were proposed. Recently. Zheng et al. proposed a certificateless based PEKS scheme called CLKS. In this paper, we show that Zheng et al.’s CLKS scheme has some security flaw, i.e. their scheme suffered from an off-line keyword guessing attack.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Al-Riyami, S.S., Paterson, K.G.: Certificateless public key cryptography. In: International Conference on the Theory and Application of Cryptology and Information Security, pp. 452–473. Springer (2003)

    Google Scholar 

  2. Baek, J., Safavi-Naini, R., Susilo, W.: Public key encryption with keyword search revisited. In: Computational science and its applications-ICCSA 2008, pp. 1249–1259 (2008)

    Google Scholar 

  3. Boneh, D., Di Crescenzo, G., Ostrovsky, R., Persiano, G.: Public key encryption with keyword search. In: International Conference on the Theory and Applications of Cryptographic Techniques, pp. 506–522. Springer (2004)

    Google Scholar 

  4. Boneh, D., Franklin, M.: Identity-based encryption from the weil pairing. In: Annual International Cryptology Conference, pp. 213–229. Springer (2001)

    Google Scholar 

  5. Boneh, D., Waters, B.: Conjunctive, subset, and range queries on encrypted data. In: Theory of Cryptography Conference, pp. 535–554. Springer (2007)

    Google Scholar 

  6. Buccafurri, F., Lax, G., Sahu, R.A., Saraswat, V.: Practical and secure integrated PKE+PEKS with keyword privacy. In: 2015 12th International Joint Conference on e-Business and Telecommunications (ICETE), vol. 4, pp. 448–453. IEEE (2015)

    Google Scholar 

  7. Buyrukbilen, S., Bakiras, S.: Privacy-preserving ranked search on public-key encrypted data. In: 2013 IEEE International Conference on Embedded and Ubiquitous Computing (HPCC_EUC), 2013 IEEE 10th International Conference on High Performance Computing and Communications, pp. 165–174. IEEE (2013)

    Google Scholar 

  8. Byun, J.W., Rhee, H.S., Park, H.A., Lee, D.H.: Off-line keyword guessing attacks on recent keyword search schemes over encrypted data. In: Workshop on Secure Data Management, pp. 75–83. Springer (2006)

    Google Scholar 

  9. Chen, L., Cheng, Z., Smart, N.P.: Identity-based key agreement protocols from pairings. Int. J. Inf. Secur. 6(4), 213–241 (2007)

    Article  Google Scholar 

  10. Cheng, L., Jin, Z., Wen, O., Zhang, H.: A novel privacy preserving keyword searching for cloud storage. In: 2013 Eleventh Annual International Conference on Privacy, Security and Trust (PST), pp. 77–81. IEEE (2013)

    Google Scholar 

  11. Cheng, Z., Chen, L., Ling, L., Comley, R.: General and efficient certificateless public key encryption constructions. In: International Conference on Pairing-Based Cryptography, pp. 83–107. Springer (2007)

    Google Scholar 

  12. Dent, A.W., Libert, B., Paterson, K.G.: Certificateless encryption schemes strongly secure in the standard model. In: International Workshop on Public Key Cryptography, pp. 344–359. Springer (2008)

    Google Scholar 

  13. He, T., Ma, W.: An effective fuzzy keyword search scheme in cloud computing. In: 2013 5th International Conference on Intelligent Networking and Collaborative Systems (INCoS), pp. 786–789. IEEE (2013)

    Google Scholar 

  14. Hu, C., Liu, P.: An enhanced searchable public key encryption scheme with a designated tester and its extensions. J. Comput. 7(3), 716–723 (2012)

    Article  Google Scholar 

  15. Hu, C., Liu, P.: Public key encryption with ranked multi-keyword search. In: 2013 5th International Conference on Intelligent Networking and Collaborative Systems (INCoS), pp. 109–113. IEEE (2013)

    Google Scholar 

  16. Huang, X., Susilo, W., Mu, Y., Zhang, F.: On the security of certificateless signature schemes from asiacrypt 2003. In: International Conference on Cryptology and Network Security, pp. 13–25. Springer (2005)

    Google Scholar 

  17. Hwang, Y.H., Lee, P.J.: Public key encryption with conjunctive keyword search and its extension to a multi-user system. In: International Conference on Pairing-Based Cryptography, pp. 2–22. Springer (2007)

    Google Scholar 

  18. Li, X., Chen, K., Sun, L.: Certificateless signature and proxy signature schemes from bilinear pairings. Lith. Math. J. 45(1), 76–83 (2005)

    Article  MathSciNet  MATH  Google Scholar 

  19. Li, Z., Zhao, M., Jiang, H., Xu, Q.: Multi-user searchable encryption with a designated server. Ann. Telecommun. (2017). doi:10.1007/s12243-017-0571-x

  20. Liang, K., Su, C., Chen, J., Liu, J.K.: Efficient multi-function data sharing and searching mechanism for cloud-based encrypted data. In: Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, pp. 83–94. ACM (2016)

    Google Scholar 

  21. Lippold, G., Boyd, C., Nieto, J.G.: Strongly secure certificateless key agreement. In: International Conference on Pairing-Based Cryptography, pp. 206–230. Springer (2009)

    Google Scholar 

  22. Park, D.J., Kim, K., Lee, P.J.: Public key encryption with conjunctive field keyword search. In: International Workshop on Information Security Applications, pp. 73–86. Springer (2004)

    Google Scholar 

  23. Peng, Y., Cui, J., Peng, C., Ying, Z.: Certificateless public key encryption with keyword search. China Commun. 11(11), 100–113 (2014)

    Article  Google Scholar 

  24. Rane, D.D., Ghorpade, V.: Multi-user multi-keyword privacy preserving ranked based search over encrypted cloud data. In: 2015 International Conference on Pervasive Computing (ICPC), pp. 1–4. IEEE (2015)

    Google Scholar 

  25. Rhee, H.S., Park, J.H., Susilo, W., Lee, D.H.: Trapdoor security in a searchable public-key encryption scheme with a designated tester. J. Syst. Softw. 83(5), 763–771 (2010)

    Article  Google Scholar 

  26. Rhee, H.S., Susilo, W., Kim, H.J.: Secure searchable public key encryption scheme against keyword guessing attacks. IEICE Electron. Express 6(5), 237–243 (2009)

    Article  Google Scholar 

  27. Wang, B., Chen, T., Jeng, F.: Security improvement against malicious server’s attackfor a dPEKS scheme. Int. J. Inf. Educ. Technol. 1(4), 350 (2011)

    Google Scholar 

  28. Wu, T.Y., Meng, F., Chen, C.M., Liu, S., Pan, J.S.: On the security of a certificateless searchable public key encryption scheme. In: International Conference on Genetic and Evolutionary Computing, pp. 113–119. Springer (2016)

    Google Scholar 

  29. Wu, T.Y., Tsai, T.T., Tseng, Y.M.: A revocable id-based signcryption scheme. J. Inf. Hiding Multimed. Signal Process. 3(3), 240–251 (2012)

    Google Scholar 

  30. Wu, T.Y., Tsai, T.T., Tseng, Y.M.: Efficient searchable id-based encryption with a designated server. Ann. Telecommun. annales des télécommunications 69(7–8), 391–402 (2014)

    Google Scholar 

  31. Wu, T.Y., Tseng, Y.M.: An id-based mutual authentication and key exchange protocol for low-power mobile devices. Comput. J. 53(7), 1062–1070 (2010)

    Article  Google Scholar 

  32. Xu, P., Jin, H., Wu, Q., Wang, W.: Public-key encryption with fuzzy keyword search: A provably secure scheme under keyword guessing attack. IEEE Trans. Comput. 62(11), 2266–2277 (2013)

    Article  MathSciNet  MATH  Google Scholar 

  33. Xu, Y., Zhong, H., Cui, J.: An improved identity-based multi-proxy multi-signature scheme. J. Inf. Hiding Multimed. Signal Process. 7(2), 343–351 (2016)

    Google Scholar 

  34. Yau, W.C., Phan, R.C.W., Heng, S.H., Goi, B.M.: Keyword guessing attacks on secure searchable public key encryption schemes with a designated tester. Int. J. Comput. Math. 90(12), 2581–2587 (2013)

    Article  MATH  Google Scholar 

  35. Yin, S.L., Li, H., Liu, J.: A new provable secure certificateless aggregate signcryption scheme. J. Inf. Hiding Multimed. Signal Process. 7(6), 1274–1281 (2016)

    Google Scholar 

  36. Zheng, Q., Li, X., Azgin, A.: CLKS: Certificateless keyword search on encrypted data. In: International Conference on Network and System Security, pp. 239–253. Springer (2015)

    Google Scholar 

Download references

Acknowledgments

The authors would thank anonymous referees for a valuable comments and suggestions. The work of Chien-Ming Chen was supported in part by the Project NSFC (National Natural Science Foundation of China) under Grant number 61402135 and in part by Shenzhen Technical Project under Grant number JCYJ20150513151706574.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Tsu-Yang Wu .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer International Publishing AG

About this paper

Cite this paper

Wu, TY., Meng, C., Chen, CM., Wang, KH., Pan, JS. (2018). On the Security of a Certificateless Public Key Encryption with Keyword Search. In: Pan, JS., Tsai, PW., Watada, J., Jain, L. (eds) Advances in Intelligent Information Hiding and Multimedia Signal Processing. IIH-MSP 2017. Smart Innovation, Systems and Technologies, vol 81. Springer, Cham. https://doi.org/10.1007/978-3-319-63856-0_24

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-63856-0_24

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-63855-3

  • Online ISBN: 978-3-319-63856-0

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics