Skip to main content
Erschienen in:

08.02.2024

Public key authenticated encryption with field-free subset conjunctive and disjunctive keyword search against keyword guessing attacks

verfasst von: Venkata Bhikshapathi Chenam, Suneeth Yadav Tummala, Syed Taqi Ali

Erschienen in: Peer-to-Peer Networking and Applications | Ausgabe 3/2024

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Der Artikel führt ein neues Schema namens "Public Key Authenticated Encryption with Field-free Subset Conjunkctive and Disjunkctive Keyword Search" (PAEFSCDKS) ein, um die Sicherheit des Cloud-Speichers durch Schutz vor Keyword-Rating-Angriffen und Falltürerforschung zu verbessern. Das vorgeschlagene Schema baut auf den bestehenden Methoden der Public Key Encryption with Keyword Search (PEKS) auf, wobei die Authentifizierung des Absenders einbezogen und eine flexiblere Schlüsselwortsuche unterstützt wird. Die Autoren analysieren die Schwachstellen des "Efficient Public Key Encryption with Field-free Conjunctive Keyword Search" (PEFCK) -Schemas und liefern Sicherheitsnachweise für ihre neue Konstruktion auf der Grundlage der Annahmen Decisional Linear and Decisional Diffie-Hellman. Der Artikel enthält auch eine umfassende Leistungsanalyse, in der das vorgeschlagene Schema mit verwandten Methoden verglichen und seine überlegenen Effizienz- und Sicherheitsmerkmale hervorgehoben werden.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Boneh D, Di Crescenzo G, Ostrovsky R, Persiano G (2004) Public key encryption with keyword search. In: Advances in Cryptology-EUROCRYPT 2004: International Conference on the Theory and Applications of Cryptographic Techniques, Interlaken, Switzerland, May 2-6, 2004. Proceedings 23, pp. 506–522. Springer Boneh D, Di Crescenzo G, Ostrovsky R, Persiano G (2004) Public key encryption with keyword search. In: Advances in Cryptology-EUROCRYPT 2004: International Conference on the Theory and Applications of Cryptographic Techniques, Interlaken, Switzerland, May 2-6, 2004. Proceedings 23, pp. 506–522. Springer
2.
Zurück zum Zitat Song DX, Wagner D, Perrig A (2000) Practical techniques for searches on encrypted data. In: Proceeding 2000 IEEE Symposium on Security and Privacy. S &P 2000, pp. 44–55. IEEE Song DX, Wagner D, Perrig A (2000) Practical techniques for searches on encrypted data. In: Proceeding 2000 IEEE Symposium on Security and Privacy. S &P 2000, pp. 44–55. IEEE
3.
Zurück zum Zitat Golle P, Staddon J, Waters B (2004) Secure conjunctive keyword search over encrypted data. In: International Conference on Applied Cryptography and Network Security, pp. 31–45. Springer Golle P, Staddon J, Waters B (2004) Secure conjunctive keyword search over encrypted data. In: International Conference on Applied Cryptography and Network Security, pp. 31–45. Springer
4.
Zurück zum Zitat Ge X, Yu J, Zhang H, Hu C, Li Z, Qin Z, Hao R (2019) Towards achieving keyword search over dynamic encrypted cloud data with symmetric-key based verification. IEEE Trans Dependable Secure Comput 18(1):490–504CrossRef Ge X, Yu J, Zhang H, Hu C, Li Z, Qin Z, Hao R (2019) Towards achieving keyword search over dynamic encrypted cloud data with symmetric-key based verification. IEEE Trans Dependable Secure Comput 18(1):490–504CrossRef
5.
Zurück zum Zitat Sun SF, Yuan X, Liu JK, Steinfeld R, Sakzad A, Vo V, Nepal S (2018) Practical backward-secure searchable encryption from symmetric puncturable encryption. In: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, pp. 763–780 Sun SF, Yuan X, Liu JK, Steinfeld R, Sakzad A, Vo V, Nepal S (2018) Practical backward-secure searchable encryption from symmetric puncturable encryption. In: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, pp. 763–780
6.
Zurück zum Zitat Chatterjee S, Kesarwani M, Modi J, Mukherjee S, Parshuram Puria SK, Shah A (2021) Secure and efficient wildcard search over encrypted data. Int J Inf Secur 20(2):199–244CrossRef Chatterjee S, Kesarwani M, Modi J, Mukherjee S, Parshuram Puria SK, Shah A (2021) Secure and efficient wildcard search over encrypted data. Int J Inf Secur 20(2):199–244CrossRef
7.
Zurück zum Zitat Park DJ, Kim K, Lee PJ (2005) Public key encryption with conjunctive field keyword search. In: Information Security Applications: 5th International Workshop, WISA 2004, Jeju Island, Korea, August 23-25, 2004, Revised Selected Papers 5, pp. 73–86. Springer Park DJ, Kim K, Lee PJ (2005) Public key encryption with conjunctive field keyword search. In: Information Security Applications: 5th International Workshop, WISA 2004, Jeju Island, Korea, August 23-25, 2004, Revised Selected Papers 5, pp. 73–86. Springer
8.
Zurück zum Zitat Byun JW, Lee DH, Lim J (2006) Efficient conjunctive keyword search on encrypted data storage system. In: EuroPKI, vol. 4043, pp. 184–196. Springer Byun JW, Lee DH, Lim J (2006) Efficient conjunctive keyword search on encrypted data storage system. In: EuroPKI, vol. 4043, pp. 184–196. Springer
9.
Zurück zum Zitat Hwang YH, Lee PJ (2007) Public key encryption with conjunctive keyword search and its extension to a multi-user system. In: International Conference on Pairing-based Cryptography, pp. 2–22. Springer Hwang YH, Lee PJ (2007) Public key encryption with conjunctive keyword search and its extension to a multi-user system. In: International Conference on Pairing-based Cryptography, pp. 2–22. Springer
10.
Zurück zum Zitat Boneh D, Waters B (2007) Conjunctive, subset, and range queries on encrypted data. In: Theory of Cryptography Conference, pp. 535–554. Springer Boneh D, Waters B (2007) Conjunctive, subset, and range queries on encrypted data. In: Theory of Cryptography Conference, pp. 535–554. Springer
11.
Zurück zum Zitat Wang P, Wang H, Pieprzyk J (2008) Keyword field-free conjunctive keyword searches on encrypted data and extension for dynamic groups. In: Cryptology and Network Security: 7th International Conference, CANS 2008, Hong-Kong, China, December 2-4, 2008. Proceedings 7, pp. 178–195. Springer Wang P, Wang H, Pieprzyk J (2008) Keyword field-free conjunctive keyword searches on encrypted data and extension for dynamic groups. In: Cryptology and Network Security: 7th International Conference, CANS 2008, Hong-Kong, China, December 2-4, 2008. Proceedings 7, pp. 178–195. Springer
13.
Zurück zum Zitat Song C, Liu X, Yan Y (2015) Efficient public key encryption with field-free conjunctive keywords search. In: Trusted Systems: 6th International Conference, INTRUST 2014, Beijing, China, December 16-17, 2014, Revised Selected Papers 6, pp. 394–406. Springer Song C, Liu X, Yan Y (2015) Efficient public key encryption with field-free conjunctive keywords search. In: Trusted Systems: 6th International Conference, INTRUST 2014, Beijing, China, December 16-17, 2014, Revised Selected Papers 6, pp. 394–406. Springer
14.
Zurück zum Zitat Okamoto T, Takashima K (2012) Adaptively attribute-hiding (hierarchical) inner product encryption. In: Advances in Cryptology–EUROCRYPT 2012: 31st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cambridge, UK, April 15-19, 2012. Proceedings 31, pp. 591–608. Springer Okamoto T, Takashima K (2012) Adaptively attribute-hiding (hierarchical) inner product encryption. In: Advances in Cryptology–EUROCRYPT 2012: 31st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cambridge, UK, April 15-19, 2012. Proceedings 31, pp. 591–608. Springer
15.
Zurück zum Zitat Anada H, Kanaoka A, Matsuzaki N, Watanabe Y (2020) Key-updatable public-key encryption with keyword search (Or: How to realize PEKS with efficient key updates for IoT environments). Int J Inf Secur 19(1):15–38CrossRef Anada H, Kanaoka A, Matsuzaki N, Watanabe Y (2020) Key-updatable public-key encryption with keyword search (Or: How to realize PEKS with efficient key updates for IoT environments). Int J Inf Secur 19(1):15–38CrossRef
16.
Zurück zum Zitat Byun JW, Rhee HS, Park HA, Lee DH (2006) Off-line keyword guessing attacks on recent keyword search schemes over encrypted data. In: Workshop on Secure Data Management, pp. 75–83. Springer Byun JW, Rhee HS, Park HA, Lee DH (2006) Off-line keyword guessing attacks on recent keyword search schemes over encrypted data. In: Workshop on Secure Data Management, pp. 75–83. Springer
17.
Zurück zum Zitat Tang Q, Chen L (2010) Public-key encryption with registered keyword search. In: Public Key Infrastructures, Services and Applications: 6th European Workshop, EuroPKI 2009, Pisa, Italy, September 10-11, 2009, Revised Selected Papers 6, pp. 163–178. Springer Tang Q, Chen L (2010) Public-key encryption with registered keyword search. In: Public Key Infrastructures, Services and Applications: 6th European Workshop, EuroPKI 2009, Pisa, Italy, September 10-11, 2009, Revised Selected Papers 6, pp. 163–178. Springer
18.
Zurück zum Zitat Chen Y-C (2015) SPEKS: secure server-designation public key encryption with keyword search against keyword guessing attacks. Comput J 58(4):922–933CrossRef Chen Y-C (2015) SPEKS: secure server-designation public key encryption with keyword search against keyword guessing attacks. Comput J 58(4):922–933CrossRef
19.
Zurück zum Zitat Chen R, Mu Y, Yang G, Guo F, Wang X (2015) Dual-server public-key encryption with keyword search for secure cloud storage. IEEE Trans Inf Forensics Secur 11(4):789–798CrossRef Chen R, Mu Y, Yang G, Guo F, Wang X (2015) Dual-server public-key encryption with keyword search for secure cloud storage. IEEE Trans Inf Forensics Secur 11(4):789–798CrossRef
20.
Zurück zum Zitat Huang Q, Li H (2017) An efficient public-key searchable encryption scheme secure against inside keyword guessing attacks. Inf Sci 403:1–14CrossRef Huang Q, Li H (2017) An efficient public-key searchable encryption scheme secure against inside keyword guessing attacks. Inf Sci 403:1–14CrossRef
21.
Zurück zum Zitat Emura K (2022) Generic Construction of Public-key Authenticated Encryption with Keyword Search Revisited: Stronger Security and Efficient Construction. In: Proceedings of the 9th ACM on ASIA Public-Key Cryptography Workshop, pp. 39–49 Emura K (2022) Generic Construction of Public-key Authenticated Encryption with Keyword Search Revisited: Stronger Security and Efficient Construction. In: Proceedings of the 9th ACM on ASIA Public-Key Cryptography Workshop, pp. 39–49
25.
Zurück zum Zitat Bhikshapathi Chenam V, Taqi Ali S (2023) Bidirectional certificateless searchable authenticated encryption for encrypted email application in IoT. In: Rao UP, Alazab M, Gohil BN, Chelliah PR (eds.) Security, Privacy and Data Analytics, pp. 359–379. Springer, Singapore Bhikshapathi Chenam V, Taqi Ali S (2023) Bidirectional certificateless searchable authenticated encryption for encrypted email application in IoT. In: Rao UP, Alazab M, Gohil BN, Chelliah PR (eds.) Security, Privacy and Data Analytics, pp. 359–379. Springer, Singapore
26.
Zurück zum Zitat Qin B, Chen Y, Huang Q, Liu X, Zheng D (2020) Public-key authenticated encryption with keyword search revisited: Security model and constructions. Inf Sci 516:515–528MathSciNetCrossRef Qin B, Chen Y, Huang Q, Liu X, Zheng D (2020) Public-key authenticated encryption with keyword search revisited: Security model and constructions. Inf Sci 516:515–528MathSciNetCrossRef
27.
Zurück zum Zitat Liu Z-Y, Tseng Y-F, Tso R, Mambo M, Chen Y-C (2022) Public-key authenticated encryption with keyword search: A generic construction and its quantum-resistant instantiation. Comput J 65(10):2828–2844 Liu Z-Y, Tseng Y-F, Tso R, Mambo M, Chen Y-C (2022) Public-key authenticated encryption with keyword search: A generic construction and its quantum-resistant instantiation. Comput J 65(10):2828–2844
31.
Zurück zum Zitat Boneh D, Boyen X (2004) Efficient selective-ID secure identity-based encryption without random oracles. In: Advances in Cryptology-EUROCRYPT 2004: International Conference on the Theory and Applications of Cryptographic Techniques, Interlaken, Switzerland, May 2-6, 2004. Proceedings 23, pp. 223–238. Springer Boneh D, Boyen X (2004) Efficient selective-ID secure identity-based encryption without random oracles. In: Advances in Cryptology-EUROCRYPT 2004: International Conference on the Theory and Applications of Cryptographic Techniques, Interlaken, Switzerland, May 2-6, 2004. Proceedings 23, pp. 223–238. Springer
32.
Zurück zum Zitat Boneh D, Franklin M (2001) Identity-based encryption from the weil pairing. In: Advances in Cryptology–CRYPTO 2001: 21st Annual International Cryptology Conference, Santa Barbara, California, USA, August 19–23, 2001 Proceedings, pp. 213–229. Springer Boneh D, Franklin M (2001) Identity-based encryption from the weil pairing. In: Advances in Cryptology–CRYPTO 2001: 21st Annual International Cryptology Conference, Santa Barbara, California, USA, August 19–23, 2001 Proceedings, pp. 213–229. Springer
33.
Zurück zum Zitat Boneh D (1998) The decision diffie-hellman problem. In: International Algorithmic Number Theory Symposium, pp. 48–63. Springer Boneh D (1998) The decision diffie-hellman problem. In: International Algorithmic Number Theory Symposium, pp. 48–63. Springer
34.
Zurück zum Zitat Boneh D, Boyen X, Shacham H (2004) Short group signatures. In: Crypto, vol. 3152, pp. 41–55. Springer Boneh D, Boyen X, Shacham H (2004) Short group signatures. In: Crypto, vol. 3152, pp. 41–55. Springer
35.
Zurück zum Zitat Fan C-I, Huang L-Y, Ho P-H (2010) Anonymous multireceiver identity-based encryption. IEEE Trans Comput 59(9):1239–1249MathSciNetCrossRef Fan C-I, Huang L-Y, Ho P-H (2010) Anonymous multireceiver identity-based encryption. IEEE Trans Comput 59(9):1239–1249MathSciNetCrossRef
Metadaten
Titel
Public key authenticated encryption with field-free subset conjunctive and disjunctive keyword search against keyword guessing attacks
verfasst von
Venkata Bhikshapathi Chenam
Suneeth Yadav Tummala
Syed Taqi Ali
Publikationsdatum
08.02.2024
Verlag
Springer US
Erschienen in
Peer-to-Peer Networking and Applications / Ausgabe 3/2024
Print ISSN: 1936-6442
Elektronische ISSN: 1936-6450
DOI
https://doi.org/10.1007/s12083-023-01618-2