Abstract
In public-key setting, the problem of searching for keywords in encrypted data is handled by the notion of public-key encryption with keyword search (PEKS). An important challenge in designing secure PEKS schemes is providing resistance against variants of an attack known as the keyword guessing attack (KGA). Basically, by KGA, an adversary is able to determine the searched keyword through using the data communicated in the search process. Security against offline KGA performed by both inside/outside adversaries is well-studied in the literature. However, this is not true about the online version. In this paper, we employ a technique called ciphertext re-randomization to propose a generic construction for designing PEKS schemes which are secure against both online and offline KGAs performed by outsiders. We show that compared to existing literature, our construction is more efficient in terms of computational and communication costs.
Similar content being viewed by others
References
Ajtai M (1996) Generating hard instances of lattice problems (extended abstract). In: Proceedings of the twenty-eighth annual ACM symposium on theory of computing, ACM, New York, NY, USA, STOC ’96, pp 99–108
Behnia R, Ozmen MO, Yavuz AA (2018) Lattice-based public key searchable encryption from experimental perspectives. IEEE Transactions on Dependable and Secure Computing (in press)
Blazy O, Fuchsbauer G, Pointcheval D, Vergnaud D (2011) Signatures on randomizable ciphertexts. In: Proceedings of the 14th international conference on practice and theory in public key cryptography, Italy, Springer Berlin Heidelberg, pp 403–422
Boneh D, Di Crescenzo G, Ostrovsky R, Persiano G (2004) Public key encryption with keyword search. In: Proceedings of international conference on the theory and applications of cryptographic techniques, Switzerland, Advances in Cryptology—EUROCRYPT 2004, Springer, Berlin Heidelberg, pp 506–522
Bösch C, Tang Q, Hartel P, Jonker W (2012) Selective document retrieval from encrypted database. In: Proceedings of the 15th international conference, Information Security, Germany, Springer Berlin Heidelberg, pp 224–241
Brakerski Z, Vaikuntanathan V (2011) Fully homomorphic encryption from ring—LWE and security for key dependent messages. In: Advances in cryptology—CRYPTO 2011. Springer, Berlin Heidelberg, Berlin, Heidelberg, pp 505–524
Byun JW, Rhee HS, Park HA, Lee DH (2006) Off-line keyword guessing attacks on recent keyword search schemes over encrypted data. In: Proceedings of the third VLDB workshop, secure data management, Korea, Springer Berlin Heidelberg, pp 75–83
Chase M, Kohlweiss M, Lysyanskaya A, Meiklejohn S (2013) Verifiable elections that scale for free. In: Proceedings of the 16th international conference on practice and theory in public-key cryptography, Japan, Springer Berlin Heidelberg, pp 479–496
Chen YC (2015) SPEKS: secure server-designation public key encryption with keyword search against keyword guessing attacks. Comput J 58(4):922–933
Curtmola R, Garay J, Kamara S, Ostrovsky R (2011) Searchable symmetric encryption: improved definitions and efficient constructions. J Comput Secur 19(5):895–934
Gu C, Zheng Y, Kang F, Xin D (2015) Keyword search over encrypted data in cloud computing from lattices in the standard model. In: Cloud computing and big data. Springer International Publishing, Cham, pp 335–343
Huang Q, Li H (2017) An efficient public-key searchable encryption scheme secure against inside keyword guessing attacks. Inform Sci 403:1–14
Hwang YH, Lee PJ (2007) Public key encryption with conjunctive keyword search and its extension to a multi-user system. In: Proceedings of pairing 2007, LNCS, Springer, vol 4575, pp 2–22
Izabachène M, Pointcheval D, Vergnaud D (2010) Mediated traceable anonymous encryption. In: Proceedings of the first international conference on cryptology and information security in Latin America, Mexico, Progress in Cryptology—LATINCRYPT, Springer Berlin Heidelberg, pp 40–60
Jeong IR, Kwon JO, Hong D, Lee DH (2009) Constructing PEKS schemes secure against keyword guessing attacks is possible? Comput Commun 32(2):394–396
Kiraz MS (2016) A comprehensive meta-analysis of cryptographic security mechanisms for cloud computing. J Ambient Intell Hum Comput 7(5):731–760
Kiyomoto S, Fukushima K, Miyake Y (2014) Security issues on IT systems during disasters: a survey. J Ambient Intell Hum Comput 5(2):173–185
Li CT, Lee CW, Shen JJ (2015) An extended chaotic maps-based keyword search scheme over encrypted data resist outside and inside keyword guessing attacks in cloud storage services. Nonlinear Dyn 80(3):1601–1611
Makkaoui KE, Beni-Hssane A, Ezzati A (2018) Speedy cloud- RSA homomorphic scheme for preserving data confidentiality in cloud computing. Journal of Ambient Intelligence and Humanized Computing. https://doi.org/10.1007/s12652-018-0844-x
Mao Y, Fu X, Guo C, Wu G (2018) Public key encryption with conjunctive keyword search secure against keyword guessing attack from lattices. Trans Emerg Telecommun Technol. https://doi.org/10.1002/ett.3531 (in press)
Naehrig M, Lauter K, Vaikuntanathan V (2011) Can homomorphic encryption be practical? In: 3rd ACM Workshop CCSW, pp 113–124
Noroozi M, Eslami Z (2018) Public key authenticated encryption with keyword search: revisited. IET Inform Secur. https://doi.org/10.1049/iet-ifs20185315 (in press)
Noroozi M, Eslami Z, Pakniat N (2018a) Comments on a chaos-based public key encryption with keyword search scheme. Nonlinear Dyn 94:1127–1132
Noroozi M, Karoubi I, Eslami Z (2018b) Designing a secure designated server identity-based encryption with keyword search scheme: still unsolved. Ann Telecommun 73(11–12):769–776
Pakniat N (2016) Public key encryption with keyword search and keyword guessing attack: a survey. In: Proceedings of the 13th international Iranian Society of cryptology conference on information security and cryptology (ISCISC), pp 1–4
Park D, Kim K, Lee P (2004) Public key encryption with conjunctive field keyword search. In: Proceedings of WISA 2004, LNCS, Springer, vol 3325, pp 73–86
Ren K, Wang C, Wang Q (2012) Security challenges for the public cloud. IEEE Internet Comput 16(1):69–73
Rhee HS, Park JH, Susilo W, Lee DH (2010) Trapdoor security in a searchable public-key encryption scheme with a designated tester. J Syst Softw 83(5):763–771
Sen J (2013) Homomorphic encryption: theory and applications. CoRR abs/1305.5886, 1305.5886
Song DX, Wagner D, Perrig A (2000) Practical techniques for searches on encrypted data. In: Proceedings of IEEE symposium on security and privacy, Washington, DC, USA, pp 44–55
Tang Q, Chen L (2010) Public-key encryption with registered keyword search. In: Proceedings of the 6th European Conference on public key infrastructures, services and applications. Springer, pp 163–178
Wang B, Li M, Wang H (2016) Geometric range search on encrypted spatial data. IEEE Trans Inform Forensics Secur 11(4):704–719
Wu T, Tsai T, Tseng Y (2014) Efficient searchable ID-based encryption with a designated server. Ann Telecommun 69(7):391–402
Xiong L, Kumari S, Shen J, Wu F, Chen C, Islaml SH (2017) Secure data access and sharing scheme for cloud storage. Wirel Pers Commun 96(4):5295–5314
Xu P, Jin H, Wu Q, Wang W (2013) Public-key encryption with fuzzy keyword search: a provably secure scheme under keyword guessing attack. IEEE Trans Comput 62(11):2266–2277
Yau WC, Phan RCW, Heng SH, Goi BM (2013) Keyword guessing attacks on secure searchable public key encryption schemes with a designated tester. Int J Comput Math 90(12):2581–2587
Zhang B, Zhang F (2011) An efficient public key encryption with conjunctive-subset keywords search. J Netw Comput Appl 34(1):262–267
Zhang G, Qin J (2015) Lattice-based threshold cryptography and its applications in distributed cloud computing. Int J High Perform Comput Netw 8(2):176–185
Zhang M, Wu L, Wang XA, Yang X (2016) Unidirectional IBPRE scheme from lattice for cloud computation. J Ambient Intell Hum Comput 7(5):623–631
Zhang R, Xue R, Liu L (2018a) Searchable encryption for healthcare clouds: a survey. IEEE Trans Serv Comput 11(6):978–996
Zhang X, Xu C (2018) Trapdoor security lattice-based public-key searchable encryption with a designated cloud server. Wirel Pers Commun 100(3):907–921
Zhang X, Xu C, Mu L, Zhao J (2018b) Identity-based encryption with keyword search from lattice assumption. China Commun 15(4):164–178
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher’s Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Noroozi, M., Eslami, Z. Public-key encryption with keyword search: a generic construction secure against online and offline keyword guessing attacks. J Ambient Intell Human Comput 11, 879–890 (2020). https://doi.org/10.1007/s12652-019-01254-w
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s12652-019-01254-w