A New General Framework for Secure Public Key Encryption with Keyword Search

被引:51
作者
Chen, Rongmao [1 ,2 ]
Mu, Yi [1 ]
Yang, Guomin [1 ]
Guo, Fuchun [1 ]
Wang, Xiaofen [1 ,3 ]
机构
[1] Univ Wollongong, Sch Comp & Informat Technol, Ctr Comp & Informat Secur Res, Wollongong, NSW, Australia
[2] Natl Univ Def Technol, Coll Comp, Changsha, Hunan, Peoples R China
[3] Univ Elect Sci & Technol China, Dept Comp Sci & Engn, Chengdu 610054, Peoples R China
来源
INFORMATION SECURITY AND PRIVACY (ACISP 2015) | 2015年 / 9144卷
关键词
Dual-server public key encryption with keyword search; Smooth projective hash function; GUESSING ATTACKS; SCHEMES;
D O I
10.1007/978-3-319-19962-7_4
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Public Key Encryption with Keyword Search (PEKS), introduced by Boneh et al. in Eurocrypt' 04, allows users to search encrypted documents on an untrusted server without revealing any information. This notion is very useful in many applications and has attracted a lot of attention by the cryptographic research community. However, one limitation of all the existing PEKS schemes is that they cannot resist the Keyword Guessing Attack (KGA) launched by a malicious server. In this paper, we propose a new PEKS framework named Dual-Server Public Key Encryption with Keyword Search (DS-PEKS). This new framework can withstand all the attacks, including the KGA from the two untrusted servers, as long as they do not collude. We then present a generic construction of DS-PEKS using a new variant of the Smooth Projective Hash Functions (SPHFs), which is of independent interest.
引用
收藏
页码:59 / 76
页数:18
相关论文
共 23 条
[11]  
Byun JW, 2006, LECT NOTES COMPUT SC, V4165, P75
[12]  
Cocks C., 2001, Cryptography and Coding, Lecture Notes in Computer Science, V2260, P360, DOI [DOI 10.1007/3-540-45325-3, 10.1007/3-540-45325-332]
[13]  
Cramer R, 2002, LECT NOTES COMPUT SC, V2332, P45
[14]  
Di Crescenzo G, 2007, LECT NOTES COMPUT SC, V4859, P282
[15]  
Gennaro R, 2003, LECT NOTES COMPUT SC, V2656, P524
[16]   Smooth Projective Hashing and Two-Message Oblivious Transfer [J].
Halevi, Shai ;
Kalai, Yael Tauman .
JOURNAL OF CRYPTOLOGY, 2012, 25 (01) :158-193
[17]   Constructing PEKS schemes secure against keyword guessing attacks is possible? [J].
Jeong, Ik Rae ;
Kwon, Jeong Ok ;
Hong, Dowon ;
Lee, Dong Hoon .
COMPUTER COMMUNICATIONS, 2009, 32 (02) :394-396
[18]  
Katz J, 2011, LECT NOTES COMPUT SC, V6597, P293, DOI 10.1007/978-3-642-19571-6_18
[19]  
Khader D, 2006, LECT NOTES COMPUT SC, V3982, P298, DOI 10.1007/11751595_33
[20]   Trapdoor security in a searchable public-key encryption scheme with a designated tester [J].
Rhee, Hyun Sook ;
Park, Jong Hwan ;
Susilo, Willy ;
Lee, Dong Hoon .
JOURNAL OF SYSTEMS AND SOFTWARE, 2010, 83 (05) :763-771