Skip to main content
Log in

Keyword search encryption scheme resistant against keyword-guessing attack by the untrusted server

  • Published:
Journal of Shanghai Jiaotong University (Science) Aims and scope Submit manuscript

Abstract

The user data stored in an untrusted server, such as the centralized data center or cloud computing server, may be dangerous of eavesdropping if the data format is a plaintext. However, the general ciphertext is difficult to search and thus limited for practical usage. The keyword search encryption is a helpful mechanism that provides a searchable ciphertext for some predefined keywords. The previous studies failed to consider the attack from the data storage server to guess the keyword. This kind of attack may cause some critical information revealed to the untrusted server. This paper proposes a new keyword search encryption model that can effectively resist the keyword-guessing attack performed by the untrusted data storage (testing) server. The testing (query) secret is divided into multiple shares so that the security can be guaranteed if the servers cannot conspire with each other to retrieve all shares of the secret.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Similar content being viewed by others

References

  1. Boneh D, Grescenzo G D, Ostrovsky R, et al. Public key encryption with keyword Search [C]//Proceedings of Eurocrypt’04, LNCS 3027. Berlin, Germany: Springer-Verlag, 2004: 506–522.

    Google Scholar 

  2. Beak J, Safavi-Naini R, Susilo W. Public key encryption with keyword search revised [C]//Proceedings of the International Conference on Computational Science and Its Applications (ICCSA’ 08). Berlin: Springer-Verlag, 2008: 1249–1259.

    Google Scholar 

  3. Park J H. Efficient hidden vector encryption for conjunctive queries on encrypted data [J]. IEEE Transactions on Knowledge and Data Engineering, 2011, 23(10): 1483–1497.

    Article  Google Scholar 

  4. Zhang B, Zhang F. An efficient public key encryption with conjunctive-subset keywords search [J]. Journal of Network and Computer Applications, 2011, 34(1): 262–267.

    Article  Google Scholar 

  5. Byun J W, Rhee H S, Park H A, et al. Off-line keyword guessing attacks on recent keyword search schemes over encrypted data [C]//Proceedings of Secure Data Management, Third VLDB Workshop SDM’06, LNCS 4156. Berlin, Germany: Springer-Verlag, 2006: 75–83.

    Google Scholar 

  6. Rhee H S, Susilo W, Kim H J. Secure searchable public key encryption scheme against keyword guessing attacks [J]. IEICE Electronics Express, 2009, 6(5): 237–243.

    Article  Google Scholar 

  7. Jeong I R, Kwon J O, Hong D, et al. Constructing PEKS schemes secure against keyword guessing attacks is possible? [J] Computer Communications, 2009, 32(2): 394–396.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Chih-hung Wang  (王智弘).

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Wang, Ch., Tu, Ty. Keyword search encryption scheme resistant against keyword-guessing attack by the untrusted server. J. Shanghai Jiaotong Univ. (Sci.) 19, 440–442 (2014). https://doi.org/10.1007/s12204-014-1522-6

Download citation

  • Received:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12204-014-1522-6

Key words

CLC number

Navigation