Nothing Special   »   [go: up one dir, main page]

Skip to main content

Public Key Authenticated Encryption with Keyword Search Improved: Strong Security Model and Multi-keyword Construction

  • Conference paper
  • First Online:
Information Security and Cryptology (Inscrypt 2023)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 14526))

Included in the following conference series:

  • 361 Accesses

Abstract

To efficiently and securely search encrypted files in cloud storage, Boneh et al. proposed the notion of Public Key Encryption with Keyword Search(PEKS) in 2004. However, original PEKS is susceptible to internal keyword guessing attacks(KGA) launched by server due to the limited keyword space. To resist this attack, Huang and Li introduced the notion of Public Key Authenticated Encryption with Keyword Search (PAEKS), which effectively resists KGA from server by additional authentication between the sender and receiver before encryption. Since both the sender and receiver can generate a common authentication key, a curious sender can use the authentication key to launch KGA, resulting in easily guessing keyword from a given trapdoor. To address this issue, we propose an improved security model for PAEKS that captures both offline KGA and online KGA launched by the curious sender. Then, we present a concrete Stronger Security Public Key Authenticated Encryption with Multi-keyword Search (S-PAEMKS) scheme, which not only supports multi-keyword search but also successfully counters KGA from curious senders. Finally, the experimental results show that our scheme achieves remarkable efficiency in the encryption phase and comparable efficiency in the trapdoor and testing phases.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 59.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 79.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Baek, J., Safavi-Naini, R., Susilo, W.: Public key encryption with keyword search revisited. In: Gervasi, O., Murgante, B., Laganà, A., Taniar, D., Mun, Y., Gavrilova, M.L. (eds.) ICCSA 2008. LNCS, vol. 5072, pp. 1249–1259. Springer, Heidelberg (2008). https://doi.org/10.1007/978-3-540-69839-5_96

    Chapter  Google Scholar 

  2. Boneh, D., Di Crescenzo, G., Ostrovsky, R., Persiano, G.: Public key encryption with keyword search. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 506–522. Springer, Heidelberg (2004). https://doi.org/10.1007/978-3-540-24676-3_30

    Chapter  Google Scholar 

  3. Boyen, X.: The uber-assumption family. In: Galbraith, S.D., Paterson, K.G. (eds.) Pairing 2008. LNCS, vol. 5209, pp. 39–56. Springer, Heidelberg (2008). https://doi.org/10.1007/978-3-540-85538-5_3

    Chapter  Google Scholar 

  4. Byun, J.W., Rhee, H.S., Park, H.-A., Lee, D.H.: Off-line keyword guessing attacks on recent keyword search schemes over encrypted data. In: Jonker, W., Petković, M. (eds.) SDM 2006. LNCS, vol. 4165, pp. 75–83. Springer, Heidelberg (2006). https://doi.org/10.1007/11844662_6

    Chapter  Google Scholar 

  5. Chen, B., Wu, L., Zeadally, S., He, D.: Dual-server public-key authenticated encryption with keyword search. IEEE Trans. Cloud Comput. 10(1), 322–333 (2019)

    Article  Google Scholar 

  6. Cheng, L., Meng, F.: Security analysis of pan et al.’s public-key authenticated encryption with keyword search achieving both multi-ciphertext and multi-trapdoor indistinguishability. J. Syst. Architect. 119, 102248 (2021)

    Article  Google Scholar 

  7. Guan, Z., et al.: Cross-lingual multi-keyword rank search with semantic extension over encrypted data. Inf. Sci. 514, 523–540 (2020)

    Article  Google Scholar 

  8. He, D., Ma, M., Zeadally, S., Kumar, N., Liang, K.: Certificateless public key authenticated encryption with keyword search for industrial internet of things. IEEE Trans. Industr. Inf. 14(8), 3618–3627 (2017)

    Article  Google Scholar 

  9. Huang, Q., Huang, P., Li, H., Huang, J., Lin, H.: A more efficient public-key authenticated encryption scheme with keyword search. J. Syst. Architect. 137, 102839 (2023)

    Article  Google Scholar 

  10. Huang, Q., Li, H.: An efficient public-key searchable encryption scheme secure against inside keyword guessing attacks. Inf. Sci. 403, 1–14 (2017)

    Article  Google Scholar 

  11. Jiang, Z., Zhang, K., Wang, L., Ning, J.: Forward secure public-key authenticated encryption with conjunctive keyword search. Comput. J. 66, 2265–2278 (2022)

    Article  MathSciNet  Google Scholar 

  12. Li, H., Huang, Q., Huang, J., Susilo, W.: Public-key authenticated encryption with keyword search supporting constant trapdoor generation and fast search. IEEE Trans. Inf. Forensics Secur. 18, 396–410 (2022)

    Article  Google Scholar 

  13. Li, H., Huang, Q., Shen, J., Yang, G., Susilo, W.: Designated-server identity-based authenticated encryption with keyword search for encrypted emails. Inf. Sci. 481, 330–343 (2019)

    Article  Google Scholar 

  14. Li, H., Huang, Q., Susilo, W.: A secure cloud data sharing protocol for enterprise supporting hierarchical keyword search. IEEE Trans. Dependable Secure Comput. 19(3), 1532–1543 (2020)

    Article  Google Scholar 

  15. Lin, H.-Y., Tzeng, W.-G.: An efficient solution to the millionaires’ problem based on homomorphic encryption. In: Ioannidis, J., Keromytis, A., Yung, M. (eds.) ACNS 2005. LNCS, vol. 3531, pp. 456–466. Springer, Heidelberg (2005). https://doi.org/10.1007/11496137_31

    Chapter  Google Scholar 

  16. Liu, X., Li, H., Yang, G., Susilo, W., Tonien, J., Huang, Q.: Towards enhanced security for certificateless public-key authenticated encryption with keyword search. In: Steinfeld, R., Yuen, T.H. (eds.) ProvSec 2019. LNCS, vol. 11821, pp. 113–129. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-31919-9_7

    Chapter  Google Scholar 

  17. Liu, Z.Y., Tseng, Y.F., Tso, R., Chen, Y.C., Mambo, M.: Identity-certifying authority-aided identity-based searchable encryption framework in cloud systems. IEEE Syst. J. 16(3), 4629–4640 (2021)

    Article  Google Scholar 

  18. Lu, Y., Li, J.: Lightweight public key authenticated encryption with keyword search against adaptively-chosen-targets adversaries for mobile devices. IEEE Trans. Mob. Comput. 21(12), 4397–4409 (2021)

    Article  Google Scholar 

  19. Lu, Y., Li, J., Wang, F.: Pairing-free certificate-based searchable encryption supporting privacy-preserving keyword search function for IIoTs. IEEE Trans. Industr. Inf. 17(4), 2696–2706 (2020)

    Article  Google Scholar 

  20. Lu, Y., Wang, G., Li, J., Shen, J.: Efficient designated server identity-based encryption with conjunctive keyword search. Ann. Telecommun. 72, 359–370 (2017)

    Article  Google Scholar 

  21. Ma, M., He, D., Khan, M.K., Chen, J.: Certificateless searchable public key encryption scheme for mobile healthcare system. Comput. Electr. Eng. 65, 413–424 (2018)

    Article  Google Scholar 

  22. Ma, Y., Kazemian, H.: Public key authenticated encryption with multiple keywords search using Mamdani system. Evol. Syst. 12(3), 687–699 (2021)

    Article  Google Scholar 

  23. Noroozi, M., Eslami, Z.: Public key authenticated encryption with keyword search: revisited. IET Inf. Secur. 13(4), 336–342 (2019)

    Article  Google Scholar 

  24. Pan, X., Li, F.: Public-key authenticated encryption with keyword search achieving both multi-ciphertext and multi-trapdoor indistinguishability. J. Syst. Architect. 115, 102075 (2021)

    Article  Google Scholar 

  25. Park, D.J., Kim, K., Lee, P.J.: Public key encryption with conjunctive field keyword search. In: Lim, C.H., Yung, M. (eds.) WISA 2004. LNCS, vol. 3325, pp. 73–86. Springer, Heidelberg (2005). https://doi.org/10.1007/978-3-540-31815-6_7

    Chapter  Google Scholar 

  26. Qin, B., Chen, Y., Huang, Q., Liu, X., Zheng, D.: Public-key authenticated encryption with keyword search revisited: security model and constructions. Inf. Sci. 516, 515–528 (2020)

    Article  MathSciNet  Google Scholar 

  27. Qin, B., Cui, H., Zheng, X., Zheng, D.: Improved security model for public-key authenticated encryption with keyword search. In: Huang, Q., Yu, Yu. (eds.) ProvSec 2021. LNCS, vol. 13059, pp. 19–38. Springer, Cham (2021). https://doi.org/10.1007/978-3-030-90402-9_2

    Chapter  Google Scholar 

  28. Shao, Z.Y., Yang, B.: On security against the server in designated tester public key encryption with keyword search. Inf. Process. Lett. 115(12), 957–961 (2015)

    Article  MathSciNet  Google Scholar 

  29. Shiraly, D., Pakniat, N., Noroozi, M., Eslami, Z.: Pairing-free certificateless authenticated encryption with keyword search. J. Syst. Architect. 124, 102390 (2022)

    Article  Google Scholar 

  30. Yang, P., Li, H., Huang, J., Zhang, H., Au, M.H.A., Huang, Q.: Secure channel free public key authenticated encryption with multi-keyword search on healthcare systems. Futur. Gener. Comput. Syst. 145, 511–520 (2023)

    Article  Google Scholar 

  31. Yau, W.C., Phan, R.C.W., Heng, S.H., Goi, B.M.: Keyword guessing attacks on secure searchable public key encryption schemes with a designated tester. Int. J. Comput. Math. 90(12), 2581–2587 (2013)

    Article  Google Scholar 

  32. Zeng, M., Qian, H., Chen, J., Zhang, K.: Forward secure public key encryption with keyword search for outsourced cloud storage. IEEE Trans. Cloud Comput. 10(1), 426–438 (2019)

    Article  Google Scholar 

  33. Zhang, Y., Wang, Y., Li, Y.: Searchable public key encryption supporting semantic multi-keywords search. IEEE Access 7, 122078–122090 (2019)

    Article  Google Scholar 

Download references

Acknowledgement

This work is supported in part by the National Natural Science Foundation of China under Grant 61872409, Grant 61872152 and Grant 62272174, in part by Guangdong Basic and Applied Basic Research Foundation under Grant 2020A1515010751, in part by the Guangdong Major Project of Basic and Applied Basic Research under Grant 2019B030302008, and in part by the Science and Technology Program of Guangzhou under Grant 201902010081.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Sha Ma .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2024 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Yang, G., Ma, S., Li, H., Yang, H., Huang, Q. (2024). Public Key Authenticated Encryption with Keyword Search Improved: Strong Security Model and Multi-keyword Construction. In: Ge, C., Yung, M. (eds) Information Security and Cryptology. Inscrypt 2023. Lecture Notes in Computer Science, vol 14526. Springer, Singapore. https://doi.org/10.1007/978-981-97-0942-7_15

Download citation

  • DOI: https://doi.org/10.1007/978-981-97-0942-7_15

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-97-0941-0

  • Online ISBN: 978-981-97-0942-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics