Skip to main content

Comments on Islam Et Al.’s Certificateless Designated Server Based Public Key Encryption with Keyword Search Scheme

  • Conference paper
  • First Online:
Genetic and Evolutionary Computing (ICGEC 2017)

Abstract

Recently, Islam et al. proposed a certificateless designated server based public key encryption with keyword search (CL-dPEKS) scheme which combines the concepts of dPEKS and certificateless public key cryptosystem. In this paper, we show that their scheme does not provide the ciphertext and the trapdoor indistinguishabilities, two important security notions of dPEKS. Concretely, we demonstrate that their CL-dPEKS scheme suffered from off-line keyword guessing attacks on ciphertext and trapdoor by outside adversary and malicious server.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Al-Riyami, S.S., Paterson, K.G.: Certificateless public key cryptography. In: Advances in Cryptology-ASIACRYPT 2003, pp. 452–473. Springer (2003)

    Google Scholar 

  2. Baek, J., Safavi-Naini, R., Susilo, W.: Public key encryption with keyword search revisited. In: ComputationaL Science and Its Applications-ICCSA 2008, pp. 1249–1259 (2008)

    Google Scholar 

  3. Boneh, D., Di Crescenzo, G., Ostrovsky, R., Persiano, G.: Public key encryption with keyword search. In: Advances in Cryptology-Eurocrypt 2004, pp. 506–522. Springer (2004)

    Google Scholar 

  4. Boneh, D., Franklin, M.: Identity-based encryption from the weil pairing. In: Annual International Cryptology Conference, pp. 213–229. Springer (2001)

    Google Scholar 

  5. Byun, J.W., Rhee, H.S., Park, H.A., Lee, D.H.: Off-line keyword guessing attacks on recent keyword search schemes over encrypted data. In: Workshop on Secure Data Management, pp. 75–83. Springer (2006)

    Google Scholar 

  6. Chen, L., Cheng, Z., Smart, N.P.: Identity-based key agreement protocols from pairings. Int. J. Inf. Secur. 6(4), 213–241 (2007)

    Article  Google Scholar 

  7. Hu, C., Liu, P.: An enhanced searchable public key encryption scheme with a designated tester and its extensions. J. Comput. 7(3), 716–723 (2012)

    Article  Google Scholar 

  8. Hwang, Y., Lee, P.: Public key encryption with conjunctive keyword search and its extension to a multi-user system. In: Pairing-Based Cryptography-Pairing 2007, pp. 2–22 (2007)

    Google Scholar 

  9. Islam, S.H., Obaidat, M.S., Rajeev, V., Amin, R.: Design of a certificateless designated server based searchable public key encryption scheme. In: International Conference on Mathematics and Computing, pp. 3–15. Springer (2017)

    Google Scholar 

  10. Li, C.T., Wu, T.Y., Chen, C.L., Lee, C.C., Chen, C.M.: An efficient user authentication and user anonymity scheme with provably security for iot-based medical care system. Sensors 17(7), 1482 (2017)

    Article  Google Scholar 

  11. Lu, Y., Wang, G., Li, J., Shen, J.: Efficient designated server identity-based encryption with conjunctive keyword search. Ann. Telecommun. 72(5–6), 359–370 (2017)

    Article  Google Scholar 

  12. Ma, H., Zhang, Z., Li, H., Yin, S.L., Chu, Z.: A provable private data aggregation scheme based on digital signatures and homomorphic encryption for wireless sensor networks. J. Inf. Hiding Multimedia Signal Process. 8(3), 536–543 (2017)

    Google Scholar 

  13. Mell, P., Grance, T., et al.: The NIST definition of cloud computing (2011)

    Google Scholar 

  14. Miller, V.S.: The weil pairing, and its efficient calculation. J. Cryptol. 17(4), 235–261 (2004)

    Article  MATH  MathSciNet  Google Scholar 

  15. Park, D.J., Kim, K., Lee, P.J.: Public key encryption with conjunctive field keyword search. In: International Workshop on Information Security Applications, pp. 73–86. Springer (2004)

    Google Scholar 

  16. Peng, Y., Cui, J., Peng, C., Ying, Z.: Certificateless public key encryption with keyword search. Chin. Commun. 11(11), 100–113 (2014)

    Article  Google Scholar 

  17. Rhee, H.S., Park, J.H., Susilo, W., Lee, D.H.: Improved searchable public key encryption with designated tester. In: Proceedings of the 4th International Symposium on Information, Computer, and Communications Security, pp. 376–379. ACM (2009)

    Google Scholar 

  18. Rhee, H.S., Park, J.H., Susilo, W., Lee, D.H.: Trapdoor security in a searchable public-key encryption scheme with a designated tester. J. Syst. Soft. 83(5), 763–771 (2010)

    Article  Google Scholar 

  19. Rhee, H.S., Susilo, W., Kim, H.J.: Secure searchable public key encryption scheme against keyword guessing attacks. IEICE Electron. Express 6(5), 237–243 (2009)

    Article  Google Scholar 

  20. Wang, B., Chen, T., Jeng, F.: Security improvement against malicious server’s attackfor a dpeks scheme. Int. J. Inf. Edu. Technol. 1(4), 350 (2011)

    Google Scholar 

  21. Wu, T.Y., Tsai, T.T., Tseng, Y.M.: Efficient searchable ID-based encryption with a designated server. Annals of telecommunications-annales des télécommunications 69(7–8), 391–402 (2014)

    Article  Google Scholar 

  22. Wu, T.Y., Tseng, Y.M.: An ID-based mutual authentication and key exchange protocol for low-power mobile devices. Comput. J. 53(7), 1062–1070 (2010)

    Article  Google Scholar 

  23. Yau, W.C., Phan, R.C.W., Heng, S.H., Goi, B.M.: Keyword guessing attacks on secure searchable public key encryption schemes with a designated tester. Int. J. Comput. Math. 90(12), 2581–2587 (2013)

    Article  MATH  Google Scholar 

  24. Yin, S.L., Li, H., Liu, J.: A new provable secure certificateless aggregate signcryption scheme. J. Inf. Hiding Multimedia Signal Process. 7(6), 1274–1281 (2016)

    Google Scholar 

  25. Zheng, Q., Li, X., Azgin, A.: Clks: certificateless keyword search on encrypted data. In: International Conference on Network and System Security, pp. 239–253. Springer (2015)

    Google Scholar 

Download references

Acknowledgments

The authors would thank anonymous referees for a valuable comments and suggestions. The work of Chien-Ming Chen was supported in part by the Project NSFC (National Natural Science Foundation of China) under Grant number 61402135 and in part by Shenzhen Technical Project under Grant number JCYJ20170307151750788.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Tsu-Yang Wu .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Nature Singapore Pte Ltd.

About this paper

Cite this paper

Wu, TY., Meng, C., Wang, KH., Chen, CM., Pan, JS. (2018). Comments on Islam Et Al.’s Certificateless Designated Server Based Public Key Encryption with Keyword Search Scheme. In: Lin, JW., Pan, JS., Chu, SC., Chen, CM. (eds) Genetic and Evolutionary Computing. ICGEC 2017. Advances in Intelligent Systems and Computing, vol 579. Springer, Singapore. https://doi.org/10.1007/978-981-10-6487-6_24

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-6487-6_24

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-6486-9

  • Online ISBN: 978-981-10-6487-6

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics