Skip to main content
Log in

Cryptanalysis of Two Public Key Encryption Schemes with Multi-keyword Search

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

Searchable encryption is proposed to retrieve encrypted files without privacy leakage in the cloud. To improve the search accuracy and search efficiency, most researchers intend to construct multi-keyword searchable encryption schemes. Recently, two viable multi-keyword searchable encryption schemes have been proposed by Varri et al. and Yang et al. which claimed to possess some security features. In this paper, we analyze the security of both searchable encryption schemes and show that their schemes are insecure against chosen-keyword attack. Specifically, any external attacker is able to guess the keyword efficiently by intercepting the keyword ciphertexts.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1

Data Availability

Data sharing not applicable to this article as no datasets were generated or analysed during the current study.

References

  1. Boneh, D., Di Crescenzo, G., Ostrovsky, R., &Persiano, G. (2004). Public key encryption with keyword search. In International conference on the theory and applications of cryptographic techniques (pp. 506–522). Heidelberg: Springer. https://doi.org/10.1007/978-3-540-24676-3_30.

  2. Abdalla, M., Bellare, M., Catalano, D., Kiltz, E., Kohno, T., Lange, T., Malone-Lee, J., Neven, G., Paillier, P., & Shi, H. (2005). Searchable encryption revisited: Consistency properties, relation to anonymous ibe, and extensions. In Annual international cryptology conference (pp. 205–222). Springer.

  3. Wang, C., & Tu, T. (2014). Keyword search encryption scheme resistant against keyword-guessing attack by the untrusted server. Journal of Shanghai Jiaotong University (Science), 19(4), 440–442. https://doi.org/10.1007/s12204-014-1522-6

    Article  Google Scholar 

  4. Zhang, X., & Xu, C. (2018). Trapdoor security lattice-based public-key searchable encryption with a designated cloud server. Wireless Personal Communications, 100(3), 907–921. https://doi.org/10.1007/s11277-018-5357-6

    Article  Google Scholar 

  5. Zamani, M., Safkhani, M., Daneshpour, N., & Abbasian, A. (2021). A new searchable encryption scheme with integrity preservation property. Wireless Personal Communications, 116(4), 3119–3142. https://doi.org/10.1007/s11277-020-07839-5

    Article  Google Scholar 

  6. Byun, J. W., Rhee, H. S., Park, H.-A., & Lee, D. H. (2006). Off-line keyword guessing attacks on recent keyword search schemes over encrypted data. In Workshop on secure data management (pp. 75–83). Heidelberg: Springer. https://doi.org/10.1007/11844662_6.

  7. Baek, J., Safavi-Naini, R., & Susilo, W. (2008). Public key encryption with keyword search revisited. In International conference on computational science and its applications (pp. 1249–1259). Heidelberg: Springer. https://doi.org/10.1007/978-3-540-69839-5_96.

  8. Huang, Q., & Li, H. (2017). An efficient public-key searchable encryption scheme secure against inside keyword guessing attacks. Information Sciences, 403, 1–14. https://doi.org/10.1016/j.ins.2017.03.038

    Article  MATH  Google Scholar 

  9. Qin, B., Chen, Y., Huang, Q., Liu, X., & Zheng, D. (2020). Public-key authenticated encryption with keyword search revisited: Security model and constructions. Information Sciences, 516, 515–528. https://doi.org/10.1016/j.ins.2019.12.063

    Article  MathSciNet  MATH  Google Scholar 

  10. Khan, A. F., & Anandharaj, G. (2021). Ahkm: An improved class of hash based key management mechanism with combined solution for single hop and multi hop nodes in iot. Egyptian Informatics Journal, 22(2), 119–124. https://doi.org/10.1016/j.eij.2020.05.004

    Article  Google Scholar 

  11. Feroz Khan, A., & Anandharaj, G. (2019). A cognitive key management technique for energy efficiency and scalability in securing the sensor nodes in the iot environment: Ckmt. SN Applied Sciences, 1(12), 1–7. https://doi.org/10.1007/s42452-019-1628-4

    Article  Google Scholar 

  12. Li, J., Zhang, Y., Ning, J., Huang, X., Poh, G. S., & Wang, D. (2020). Attribute based encryption with privacy protection and accountability for cloudiot. IEEE Transactions on Cloud Computing.

  13. Zhang, X., Tang, Y., Wang, H., Xu, C., Miao, Y., & Cheng, H. (2019). Lattice-based proxy-oriented identity-based encryption with keyword search for cloud storage. Information Sciences, 494, 193–207. https://doi.org/10.1016/j.ins.2019.04.051

    Article  MathSciNet  MATH  Google Scholar 

  14. Zhang, D., Fan, Q., Qiao, H., & Luo, M. (2021). A public-key encryption with multi-keyword search scheme for cloud-based smart grids. In 2021 IEEE conference on dependable and secure computing (DSC) (pp. 1–6). IEEE. https://doi.org/10.1109/DSC49826.2021.9346254.

  15. Ma, Y., & Kazemian, H. (2021). Public key authenticated encryption with multiple keywords search using mamdani system. Evolving Systems, 12(3), 687–699. https://doi.org/10.1007/s12530-021-09387-0

    Article  Google Scholar 

  16. Chen, Z., Wu, A., Li, Y., Xing, Q., & Geng, S. (2021). Blockchain-enabled public key encryption with multi-keyword search in cloud computing. Security and Communication Networks. https://doi.org/10.1155/2021/6619689

    Article  Google Scholar 

  17. Du, H., Chen, J., Lin, F., Peng, C., He, D., et al. (2022). A lightweight blockchain-based public-key authenticated encryption with multi-keyword search for cloud computing. Security and Communication Networks. https://doi.org/10.1155/2022/2309834

    Article  Google Scholar 

  18. Xu, W., Zhang, J., Yuan, Y., Wang, X., Liu, Y., & Khalid, M. I. (2022). Towards efficient verifiable multi-keyword search over encrypted data based on blockchain. PeerJ Computer Science, 8, 930. https://doi.org/10.7717/peerj-cs.930

    Article  Google Scholar 

  19. Varri, U. S., Pasupuleti, S. K., & Kadambari, K. (2020). Key-escrow free attribute-based multi-keyword search with dynamic policy update in cloud computing. In 2020 20th IEEE/ACM international symposium on cluster, cloud and internet computing (CCGRID) (pp. 450–458). IEEE. https://doi.org/10.1109/CCGrid49817.2020.00-48.

  20. Yang, X., Chen, G., Wang, M., Li, T., & Wang, C. (2020). Multi-keyword certificateless searchable public key authenticated encryption scheme based on blockchain. IEEE Access, 8, 158765–158777. https://doi.org/10.1109/ACCESS.2020.3020841

    Article  Google Scholar 

Download references

Acknowledgements

This work is supported by the National Natural Science Foundation of China under Grant U21A20466, and Grant 61672030.

Funding

This work is supported by the National Natural Science Foundation of China under Grant U21A20466, and Grant 61672030.

Author information

Authors and Affiliations

Authors

Contributions

All authors contributed to the study conception and design. Material preparation, data collection and analysis were performed by JG, LH, GY, XT and FW. The first draft of the manuscript was written by JG and all authors commented on previous versions of the manuscript. All authors read and approved the final manuscript.

Corresponding author

Correspondence to Lidong Han.

Ethics declarations

Competing interests

The authors have no relevant financial or non-financial interests to disclose.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Guo, J., Han, L., Yang, G. et al. Cryptanalysis of Two Public Key Encryption Schemes with Multi-keyword Search. Wireless Pers Commun 130, 2231–2240 (2023). https://doi.org/10.1007/s11277-023-10380-w

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-023-10380-w

Keywords

Navigation