Abstract
Searchable encryption is proposed to retrieve encrypted files without privacy leakage in the cloud. To improve the search accuracy and search efficiency, most researchers intend to construct multi-keyword searchable encryption schemes. Recently, two viable multi-keyword searchable encryption schemes have been proposed by Varri et al. and Yang et al. which claimed to possess some security features. In this paper, we analyze the security of both searchable encryption schemes and show that their schemes are insecure against chosen-keyword attack. Specifically, any external attacker is able to guess the keyword efficiently by intercepting the keyword ciphertexts.
Data Availability
Data sharing not applicable to this article as no datasets were generated or analysed during the current study.
References
Boneh, D., Di Crescenzo, G., Ostrovsky, R., &Persiano, G. (2004). Public key encryption with keyword search. In International conference on the theory and applications of cryptographic techniques (pp. 506–522). Heidelberg: Springer. https://doi.org/10.1007/978-3-540-24676-3_30.
Abdalla, M., Bellare, M., Catalano, D., Kiltz, E., Kohno, T., Lange, T., Malone-Lee, J., Neven, G., Paillier, P., & Shi, H. (2005). Searchable encryption revisited: Consistency properties, relation to anonymous ibe, and extensions. In Annual international cryptology conference (pp. 205–222). Springer.
Wang, C., & Tu, T. (2014). Keyword search encryption scheme resistant against keyword-guessing attack by the untrusted server. Journal of Shanghai Jiaotong University (Science), 19(4), 440–442. https://doi.org/10.1007/s12204-014-1522-6
Zhang, X., & Xu, C. (2018). Trapdoor security lattice-based public-key searchable encryption with a designated cloud server. Wireless Personal Communications, 100(3), 907–921. https://doi.org/10.1007/s11277-018-5357-6
Zamani, M., Safkhani, M., Daneshpour, N., & Abbasian, A. (2021). A new searchable encryption scheme with integrity preservation property. Wireless Personal Communications, 116(4), 3119–3142. https://doi.org/10.1007/s11277-020-07839-5
Byun, J. W., Rhee, H. S., Park, H.-A., & Lee, D. H. (2006). Off-line keyword guessing attacks on recent keyword search schemes over encrypted data. In Workshop on secure data management (pp. 75–83). Heidelberg: Springer. https://doi.org/10.1007/11844662_6.
Baek, J., Safavi-Naini, R., & Susilo, W. (2008). Public key encryption with keyword search revisited. In International conference on computational science and its applications (pp. 1249–1259). Heidelberg: Springer. https://doi.org/10.1007/978-3-540-69839-5_96.
Huang, Q., & Li, H. (2017). An efficient public-key searchable encryption scheme secure against inside keyword guessing attacks. Information Sciences, 403, 1–14. https://doi.org/10.1016/j.ins.2017.03.038
Qin, B., Chen, Y., Huang, Q., Liu, X., & Zheng, D. (2020). Public-key authenticated encryption with keyword search revisited: Security model and constructions. Information Sciences, 516, 515–528. https://doi.org/10.1016/j.ins.2019.12.063
Khan, A. F., & Anandharaj, G. (2021). Ahkm: An improved class of hash based key management mechanism with combined solution for single hop and multi hop nodes in iot. Egyptian Informatics Journal, 22(2), 119–124. https://doi.org/10.1016/j.eij.2020.05.004
Feroz Khan, A., & Anandharaj, G. (2019). A cognitive key management technique for energy efficiency and scalability in securing the sensor nodes in the iot environment: Ckmt. SN Applied Sciences, 1(12), 1–7. https://doi.org/10.1007/s42452-019-1628-4
Li, J., Zhang, Y., Ning, J., Huang, X., Poh, G. S., & Wang, D. (2020). Attribute based encryption with privacy protection and accountability for cloudiot. IEEE Transactions on Cloud Computing.
Zhang, X., Tang, Y., Wang, H., Xu, C., Miao, Y., & Cheng, H. (2019). Lattice-based proxy-oriented identity-based encryption with keyword search for cloud storage. Information Sciences, 494, 193–207. https://doi.org/10.1016/j.ins.2019.04.051
Zhang, D., Fan, Q., Qiao, H., & Luo, M. (2021). A public-key encryption with multi-keyword search scheme for cloud-based smart grids. In 2021 IEEE conference on dependable and secure computing (DSC) (pp. 1–6). IEEE. https://doi.org/10.1109/DSC49826.2021.9346254.
Ma, Y., & Kazemian, H. (2021). Public key authenticated encryption with multiple keywords search using mamdani system. Evolving Systems, 12(3), 687–699. https://doi.org/10.1007/s12530-021-09387-0
Chen, Z., Wu, A., Li, Y., Xing, Q., & Geng, S. (2021). Blockchain-enabled public key encryption with multi-keyword search in cloud computing. Security and Communication Networks. https://doi.org/10.1155/2021/6619689
Du, H., Chen, J., Lin, F., Peng, C., He, D., et al. (2022). A lightweight blockchain-based public-key authenticated encryption with multi-keyword search for cloud computing. Security and Communication Networks. https://doi.org/10.1155/2022/2309834
Xu, W., Zhang, J., Yuan, Y., Wang, X., Liu, Y., & Khalid, M. I. (2022). Towards efficient verifiable multi-keyword search over encrypted data based on blockchain. PeerJ Computer Science, 8, 930. https://doi.org/10.7717/peerj-cs.930
Varri, U. S., Pasupuleti, S. K., & Kadambari, K. (2020). Key-escrow free attribute-based multi-keyword search with dynamic policy update in cloud computing. In 2020 20th IEEE/ACM international symposium on cluster, cloud and internet computing (CCGRID) (pp. 450–458). IEEE. https://doi.org/10.1109/CCGrid49817.2020.00-48.
Yang, X., Chen, G., Wang, M., Li, T., & Wang, C. (2020). Multi-keyword certificateless searchable public key authenticated encryption scheme based on blockchain. IEEE Access, 8, 158765–158777. https://doi.org/10.1109/ACCESS.2020.3020841
Acknowledgements
This work is supported by the National Natural Science Foundation of China under Grant U21A20466, and Grant 61672030.
Funding
This work is supported by the National Natural Science Foundation of China under Grant U21A20466, and Grant 61672030.
Author information
Authors and Affiliations
Contributions
All authors contributed to the study conception and design. Material preparation, data collection and analysis were performed by JG, LH, GY, XT and FW. The first draft of the manuscript was written by JG and all authors commented on previous versions of the manuscript. All authors read and approved the final manuscript.
Corresponding author
Ethics declarations
Competing interests
The authors have no relevant financial or non-financial interests to disclose.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Guo, J., Han, L., Yang, G. et al. Cryptanalysis of Two Public Key Encryption Schemes with Multi-keyword Search. Wireless Pers Commun 130, 2231–2240 (2023). https://doi.org/10.1007/s11277-023-10380-w
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11277-023-10380-w