Computer Science ›› 2019, Vol. 46 ›› Issue (7): 91-95.doi: 10.11896/j.issn.1002-137X.2019.07.014

• Information Security • Previous Articles     Next Articles

Efficient Public-key Searchable Encryption Scheme Against Inside Keyword Guessing Attack

WANG Shao-hui,ZHANG Yan-xuan,WANG Hua-qun,XIAO Fu,WANG Ru-chuan   

  1. (College of Computer,Nanjing University of Posts and Telecommunications,Nanjing 210003,China)
    (Jiangsu High Technology Research Key Laboratory for Wireless Sensor Networks,Nanjing 210003,China)
  • Received:2018-06-29 Online:2019-07-15 Published:2019-07-15

Abstract: In the cloud environment,how to search users’ encrypted data efficiently is the research hotspot in academic circle.Most current public-key searchable encryption schemes cannot effectively resist the Inside Keyword Guessing Attack (IKGA) launched by cloud servers,while the existing anti-IKGA schemes suffer the problems of low efficiency or the same search trapdoors generation algorithm for same keyword,which would reveal statistics information of keywords.This paper proposed a new efficient anti-IKGA public-key searchable encryption scheme,in which the search trapdoor is generated by a non-deterministic algorithm.Based on the modified DLIN (Decision Linear Problem) assumption,the new scheme is certified to satisfy semantic security against IKGA in the random oracle model.In the new scheme,the trapdoors are generated with random numbers thus same keyword has various trapdoors.Compared with other PEKS schemes,the new scheme reduces the number of bilinear pairing operations and thus has better performance advantages.

Key words: Indistinguishability, Inside keyword guessing attack, Searchable encryption

CLC Number: 

  • TP309.7
[1]SONG D X,WAGNER D,PERRIG A.Practical Techniques for Searches on Encrypted Data[C]∥IEEE Symposium on Security &Privacy.Berkeley,CA,USA:IEEE Computer Society,2000:44-55.
[2]BONEH D,CRESCENZO G D,OSTROVSKY R,et al.Public Key Encryption with Keyword Search[C]∥International Conference on the Theory and Applications of Cryptographic Techniques.Heidelberg,Berlin:Springer,2004:506-522.
[3]DONG J P,KIM K,LEE P J.Public Key Encryption with Conjunctive Field Keyword Search[C]∥International Conference on Information Security Applications.Heidelberg,Berlin:Springer,2004:73-86.
[4]ZHANG R,XUE R,LIU L,et al.Oblivious Multi-Keyword Search for Secure Cloud Storage Service[C]∥IEEE Internatio-nal Conference on Web Services.Honolulu,Hawaii,USA:IEEE Computer Society,2017:269-276.
[5]CHANG Y J,WU J L.Multi-user Searchable Encryption Scheme with Constant-Size Keys[C]∥IEEE International Symposium on Cloud and Service Computing.Kanazawa,Japan:IEEE,2018:98-103.
[6]BYUN J,RHEE H,PARK H A,et al.Off-Line Keyword Guessing Attacks on Recent Keyword Search Schemes over Encrypted Data[J].Lecture Notes in Computer Science,2006,4165:75-83.
[7]JEONG I R,KWON J O,HONG D,et al.Constructing PEKS schemes secure against keyword guessing attacks is possible?[J].Computer Communications,2009,32(2):394-396.
[8]BAEK J,SAFAVINAINI R,SUSILO W.Public key encryption with keyword search revisited[C]∥International conference on Computational Science and Its Applications.Heidelberg,Berlin:Springer,2008:1249-1259.
[9]RHEE H S,PARK J H,SUSILO W,et al.Trapdoor security in a searchable public-key encryption scheme with a designated tester[J].Journal of Systems & Software,2010,83(5):763-771.
[10]RHEE H S.Secure searchable public key encryption scheme against keyword guessing attacks[J].Ieice Electronics Express,2009,6(5):237-243.
[11]LU Y,WANG G,LI J,et al.Efficient designated server identity-based encryption with conjunctive keyword search[J].Annals of Telecommunications,2017,72(5/6):1-12.
[12]WANG C H,TU T Y.Keyword Search Encryption Scheme Resistant Against Keyword-Guessing Attack by the Untrusted Server[J].Journal of Shanghai Jiaotong University(Science),2014,19(4):440-442.
[13]SUN L,XU C,ZHANG M,et al.Secure searchable public key encryption against insider keyword guessing attacks from indistinguishability obfuscation[J].Science China(Information Scie-nces),2018,61(3):1-3.
[14]HUANG Q,LI H.An efficient public-key searchable encryption scheme secure against inside keyword guessing attacks [J].Information Sciences,2017,403-404:1-14.
[15]BONEH D,BOVEN X,SHACHAM H.Short Group Signatures[C]∥International Cryptology Conference.Heidelberg,Berlin:Springer,2004:41-55.
[16]SHAO Z Y,YANG B.On security against the server in designated tester public key encryption with keyword search[J].Information Processing Letters,2015,115(12):957-961.
[1] GAO Shi-yao, CHEN Yan-li, XU Yu-lan. Expressive Attribute-based Searchable Encryption Scheme in Cloud Computing [J]. Computer Science, 2022, 49(3): 313-321.
[2] ZHANG Xue-jun, YANG Hao-ying, LI Zhen, HE Fu-cun, GAI Ji-yang, BAO Jun-da. Differentially Private Location Privacy-preserving Scheme withSemantic Location [J]. Computer Science, 2021, 48(8): 300-308.
[3] JI Yan, DAI Hua, JIANG Ying-ying, YANG Geng, Yi Xun. Parallel Multi-keyword Top-k Search Scheme over Encrypted Data in Hybrid Clouds [J]. Computer Science, 2021, 48(5): 320-327.
[4] MA Yin-fang and ZHANG Lin. LBS Group Nearest Neighbor Query Method Based on Differential Privacy [J]. Computer Science, 2017, 44(Z6): 336-341.
[5] LI Xiao-rong, SONG Zi-ye, REN Jing-yi, XU Lei and XU Chun-gen. Attribute-based Searchable Encryption of Electronic Medical Records in Cloud Computing [J]. Computer Science, 2017, 44(Z11): 342-347.
[6] LI Lei, JIA Hui-wen, BAN Xue-hua and HE Yu-fan. Obfuscation-based Broadcasting Multi-signature Scheme [J]. Computer Science, 2017, 44(Z11): 329-333.
[7] CHEN Chao-qun and LI Zhi-hua. Privacy-preserving Oriented Ciphertext Retrieval Algorithm [J]. Computer Science, 2016, 43(Z11): 346-351.
[8] DUAN Yang-yang and LI Shi-yang. Anonymous Multi-user Searchable Encryption Scheme with Hierarchial Permission Management [J]. Computer Science, 2016, 43(2): 159-162.
[9] LIU Shu-bo, LI Yan-min and LIU Meng-jun. Privacy-preserving for Location-based Service over Encrypted Data Search [J]. Computer Science, 2015, 42(4): 101-105.
[10] FANG Zhong-jin, ZHOU Shu and XIA Zhi-hua. Research on Fuzzy Search over Encrypted Cloud Data Based on Keywords [J]. Computer Science, 2015, 42(3): 136-139.
[11] FANG Li-ming, HUANG Zhi-qiu and WANG Jian-dong. Secure Channel Free Searchable Encryption in Standard Model [J]. Computer Science, 2015, 42(11): 197-202.
[12] WU Qi and WAN Chang-xuan. Multi-user Conjunctive Keyword Search Scheme over Ciphertext [J]. Computer Science, 2013, 40(9): 147-151.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!