Abstract
Recently, Islam et al. proposed a certificateless designated server based public key encryption with keyword search (CL-dPEKS) scheme which combines the concepts of dPEKS and certificateless public key cryptosystem. In this paper, we show that their scheme does not provide the ciphertext and the trapdoor indistinguishabilities, two important security notions of dPEKS. Concretely, we demonstrate that their CL-dPEKS scheme suffered from off-line keyword guessing attacks on ciphertext and trapdoor by outside adversary and malicious server.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Al-Riyami, S.S., Paterson, K.G.: Certificateless public key cryptography. In: Advances in Cryptology-ASIACRYPT 2003, pp. 452–473. Springer (2003)
Baek, J., Safavi-Naini, R., Susilo, W.: Public key encryption with keyword search revisited. In: ComputationaL Science and Its Applications-ICCSA 2008, pp. 1249–1259 (2008)
Boneh, D., Di Crescenzo, G., Ostrovsky, R., Persiano, G.: Public key encryption with keyword search. In: Advances in Cryptology-Eurocrypt 2004, pp. 506–522. Springer (2004)
Boneh, D., Franklin, M.: Identity-based encryption from the weil pairing. In: Annual International Cryptology Conference, pp. 213–229. Springer (2001)
Byun, J.W., Rhee, H.S., Park, H.A., Lee, D.H.: Off-line keyword guessing attacks on recent keyword search schemes over encrypted data. In: Workshop on Secure Data Management, pp. 75–83. Springer (2006)
Chen, L., Cheng, Z., Smart, N.P.: Identity-based key agreement protocols from pairings. Int. J. Inf. Secur. 6(4), 213–241 (2007)
Hu, C., Liu, P.: An enhanced searchable public key encryption scheme with a designated tester and its extensions. J. Comput. 7(3), 716–723 (2012)
Hwang, Y., Lee, P.: Public key encryption with conjunctive keyword search and its extension to a multi-user system. In: Pairing-Based Cryptography-Pairing 2007, pp. 2–22 (2007)
Islam, S.H., Obaidat, M.S., Rajeev, V., Amin, R.: Design of a certificateless designated server based searchable public key encryption scheme. In: International Conference on Mathematics and Computing, pp. 3–15. Springer (2017)
Li, C.T., Wu, T.Y., Chen, C.L., Lee, C.C., Chen, C.M.: An efficient user authentication and user anonymity scheme with provably security for iot-based medical care system. Sensors 17(7), 1482 (2017)
Lu, Y., Wang, G., Li, J., Shen, J.: Efficient designated server identity-based encryption with conjunctive keyword search. Ann. Telecommun. 72(5–6), 359–370 (2017)
Ma, H., Zhang, Z., Li, H., Yin, S.L., Chu, Z.: A provable private data aggregation scheme based on digital signatures and homomorphic encryption for wireless sensor networks. J. Inf. Hiding Multimedia Signal Process. 8(3), 536–543 (2017)
Mell, P., Grance, T., et al.: The NIST definition of cloud computing (2011)
Miller, V.S.: The weil pairing, and its efficient calculation. J. Cryptol. 17(4), 235–261 (2004)
Park, D.J., Kim, K., Lee, P.J.: Public key encryption with conjunctive field keyword search. In: International Workshop on Information Security Applications, pp. 73–86. Springer (2004)
Peng, Y., Cui, J., Peng, C., Ying, Z.: Certificateless public key encryption with keyword search. Chin. Commun. 11(11), 100–113 (2014)
Rhee, H.S., Park, J.H., Susilo, W., Lee, D.H.: Improved searchable public key encryption with designated tester. In: Proceedings of the 4th International Symposium on Information, Computer, and Communications Security, pp. 376–379. ACM (2009)
Rhee, H.S., Park, J.H., Susilo, W., Lee, D.H.: Trapdoor security in a searchable public-key encryption scheme with a designated tester. J. Syst. Soft. 83(5), 763–771 (2010)
Rhee, H.S., Susilo, W., Kim, H.J.: Secure searchable public key encryption scheme against keyword guessing attacks. IEICE Electron. Express 6(5), 237–243 (2009)
Wang, B., Chen, T., Jeng, F.: Security improvement against malicious server’s attackfor a dpeks scheme. Int. J. Inf. Edu. Technol. 1(4), 350 (2011)
Wu, T.Y., Tsai, T.T., Tseng, Y.M.: Efficient searchable ID-based encryption with a designated server. Annals of telecommunications-annales des télécommunications 69(7–8), 391–402 (2014)
Wu, T.Y., Tseng, Y.M.: An ID-based mutual authentication and key exchange protocol for low-power mobile devices. Comput. J. 53(7), 1062–1070 (2010)
Yau, W.C., Phan, R.C.W., Heng, S.H., Goi, B.M.: Keyword guessing attacks on secure searchable public key encryption schemes with a designated tester. Int. J. Comput. Math. 90(12), 2581–2587 (2013)
Yin, S.L., Li, H., Liu, J.: A new provable secure certificateless aggregate signcryption scheme. J. Inf. Hiding Multimedia Signal Process. 7(6), 1274–1281 (2016)
Zheng, Q., Li, X., Azgin, A.: Clks: certificateless keyword search on encrypted data. In: International Conference on Network and System Security, pp. 239–253. Springer (2015)
Acknowledgments
The authors would thank anonymous referees for a valuable comments and suggestions. The work of Chien-Ming Chen was supported in part by the Project NSFC (National Natural Science Foundation of China) under Grant number 61402135 and in part by Shenzhen Technical Project under Grant number JCYJ20170307151750788.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Wu, TY., Meng, C., Wang, KH., Chen, CM., Pan, JS. (2018). Comments on Islam Et Al.’s Certificateless Designated Server Based Public Key Encryption with Keyword Search Scheme. In: Lin, JW., Pan, JS., Chu, SC., Chen, CM. (eds) Genetic and Evolutionary Computing. ICGEC 2017. Advances in Intelligent Systems and Computing, vol 579. Springer, Singapore. https://doi.org/10.1007/978-981-10-6487-6_24
Download citation
DOI: https://doi.org/10.1007/978-981-10-6487-6_24
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-6486-9
Online ISBN: 978-981-10-6487-6
eBook Packages: EngineeringEngineering (R0)