Skip to main content
Log in

Designing a secure designated server identity-based encryption with keyword search scheme: still unsolved

  • Published:
Annals of Telecommunications Aims and scope Submit manuscript

Abstract

There exist only a few papers in the literature which target the problem of “proposing a secure designated server identity-based encryption with keyword search scheme.” In this paper, we prove that they all suffer from security issues, and therefore, this challenging problem still remains open.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

Notes

  1. For the sake of simplicity, we review the scheme in single keyword mode. However, the flaws we report apply to the conjunctive case as well.

  2. For the sake of simplicity, we review the scheme in single receiver mode. However, the flaw we report applies to the multiple receiver mode as well.

References

  1. Song DX, Wagner D, Perrig A (2000) Practical techniques for searches on encrypted data. IEEE Symposium on Security and Privacy, IEEE Computer Society, Washington, DC, pp 44–55

  2. Curtmola R, Garay J, Kamara S, Ostrovsky R (2006) Searchable symmetric encryption: improved definitions and efficient constructions. CCS ACM, New York, pp 79–88

    Google Scholar 

  3. Boneh D, Crescenzo GD, Ostrovsky R, Persiano G (2004) Public key encryption with keyword search. EUROCRYPT (LNCS) 3027:506–522

    MathSciNet  MATH  Google Scholar 

  4. Abdalla M, Bellare M, Catalano D, Kiltz E, Kohno T, Lange T, Malone-Lee J, Neven G, Paillier P, Shi H (2005) Searchable encryption revisited: consistency properties, relation to anonymous IBE, and extensions. Advances in cryptology—CRYPTO 2005: 25th annual international cryptology conference, USA, Springer, pp 205–222

    Chapter  Google Scholar 

  5. Tian X, Wang Y (2008) ID-based encryption with keyword search scheme from bilinear pairings. 4th International Conference on Wireless Communications, Networking and Mobile Computing, IEEE, pp 1–4

  6. Tomida K, Mohri M, Shiraishi Y (2014). Keyword searchable encryption with access control from a certain identity-based encryption. In: Park JJ, Stojmenovic I, Choi M, Xhafa F (eds) Future Tech 2013, LNEE, Springer, 276, 113–118

  7. Tomida K, Doi H, Mohri M, Shiraishi Y (2015) Ciphertext divided anonymous HIBE and its transformation to identity-based encryption with keyword search. Journal of Information Processing 23(5):562–569

    Article  Google Scholar 

  8. Liu J, Lai J, Huang X (2017) Dual trapdoor identity-based encryption with keyword search. Soft Comput 21(10):2599–2607

    Article  Google Scholar 

  9. Byun JW, Rhee HS, Park H-A, Lee DH (2006) Off-line keyword guessing attacks on recent keyword search schemes over encrypted data. Workshop on Secure Data Management, Springer, pp 75–83

    Google Scholar 

  10. Pakniat N (2016) Public key encryption with keyword search and keyword guessing attack: a survey. Proceedings of the 13th International Iranian 155 Society of Cryptology Conference on Information Security and Cryptology (ISCISC), pp 1–4

  11. Rhee HS, Park JH, Susilo W, Lee DH (2010) Trapdoor security in a searchable public-key encryption scheme with a designated tester. J Syst Softw 83(5):763–771

    Article  Google Scholar 

  12. Wu TY, Tsai TT, Tseng YM (2014) Efficient searchable ID-based encryption with a designated server. Ann Telecommun 69(7):391–402

    Article  Google Scholar 

  13. Wang XF, Mu Y, Chen R, Zhang XS (2016) Secure channel free id-based searchable encryption for peer-to-peer group. J Comput Sci Technol 31(5):1012–1027

    Article  MathSciNet  Google Scholar 

  14. Lu Y, Wang G, Li J, Shen J (2017) Efficient designated server identity-based encryption with conjunctive keyword search. Ann Telecommun 72(5):359–370

    Article  Google Scholar 

  15. Goh EJ (2003) Secure indexes. Cryptology eprint archive, Report 2003/216

  16. Shamir A (1984) Identity-based cryptosystems and signature schemes. Proceedings of CRYPTO '84, LNCS 196, Springer-Verlag, pp 47–53

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ziba Eslami.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Noroozi, M., Karoubi, I. & Eslami, Z. Designing a secure designated server identity-based encryption with keyword search scheme: still unsolved. Ann. Telecommun. 73, 769–776 (2018). https://doi.org/10.1007/s12243-018-0653-4

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12243-018-0653-4

Keywords

Navigation