Skip to main content
Top
Published in: Wireless Personal Communications 3/2023

04-04-2023

Cryptanalysis of Two Public Key Encryption Schemes with Multi-keyword Search

Authors: Junling Guo, Lidong Han, Guang Yang, Xiao Tan, Fuqun Wang

Published in: Wireless Personal Communications | Issue 3/2023

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Searchable encryption is proposed to retrieve encrypted files without privacy leakage in the cloud. To improve the search accuracy and search efficiency, most researchers intend to construct multi-keyword searchable encryption schemes. Recently, two viable multi-keyword searchable encryption schemes have been proposed by Varri et al. and Yang et al. which claimed to possess some security features. In this paper, we analyze the security of both searchable encryption schemes and show that their schemes are insecure against chosen-keyword attack. Specifically, any external attacker is able to guess the keyword efficiently by intercepting the keyword ciphertexts.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
2.
go back to reference Abdalla, M., Bellare, M., Catalano, D., Kiltz, E., Kohno, T., Lange, T., Malone-Lee, J., Neven, G., Paillier, P., & Shi, H. (2005). Searchable encryption revisited: Consistency properties, relation to anonymous ibe, and extensions. In Annual international cryptology conference (pp. 205–222). Springer. Abdalla, M., Bellare, M., Catalano, D., Kiltz, E., Kohno, T., Lange, T., Malone-Lee, J., Neven, G., Paillier, P., & Shi, H. (2005). Searchable encryption revisited: Consistency properties, relation to anonymous ibe, and extensions. In Annual international cryptology conference (pp. 205–222). Springer.
6.
go back to reference Byun, J. W., Rhee, H. S., Park, H.-A., & Lee, D. H. (2006). Off-line keyword guessing attacks on recent keyword search schemes over encrypted data. In Workshop on secure data management (pp. 75–83). Heidelberg: Springer. https://doi.org/10.1007/11844662_6. Byun, J. W., Rhee, H. S., Park, H.-A., & Lee, D. H. (2006). Off-line keyword guessing attacks on recent keyword search schemes over encrypted data. In Workshop on secure data management (pp. 75–83). Heidelberg: Springer. https://​doi.​org/​10.​1007/​11844662_​6.
12.
go back to reference Li, J., Zhang, Y., Ning, J., Huang, X., Poh, G. S., & Wang, D. (2020). Attribute based encryption with privacy protection and accountability for cloudiot. IEEE Transactions on Cloud Computing. Li, J., Zhang, Y., Ning, J., Huang, X., Poh, G. S., & Wang, D. (2020). Attribute based encryption with privacy protection and accountability for cloudiot. IEEE Transactions on Cloud Computing.
19.
go back to reference Varri, U. S., Pasupuleti, S. K., & Kadambari, K. (2020). Key-escrow free attribute-based multi-keyword search with dynamic policy update in cloud computing. In 2020 20th IEEE/ACM international symposium on cluster, cloud and internet computing (CCGRID) (pp. 450–458). IEEE. https://doi.org/10.1109/CCGrid49817.2020.00-48. Varri, U. S., Pasupuleti, S. K., & Kadambari, K. (2020). Key-escrow free attribute-based multi-keyword search with dynamic policy update in cloud computing. In 2020 20th IEEE/ACM international symposium on cluster, cloud and internet computing (CCGRID) (pp. 450–458). IEEE. https://​doi.​org/​10.​1109/​CCGrid49817.​2020.​00-48.
Metadata
Title
Cryptanalysis of Two Public Key Encryption Schemes with Multi-keyword Search
Authors
Junling Guo
Lidong Han
Guang Yang
Xiao Tan
Fuqun Wang
Publication date
04-04-2023
Publisher
Springer US
Published in
Wireless Personal Communications / Issue 3/2023
Print ISSN: 0929-6212
Electronic ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-023-10380-w

Other articles of this Issue 3/2023

Wireless Personal Communications 3/2023 Go to the issue