Abstract
There exist only a few papers in the literature which target the problem of “proposing a secure designated server identity-based encryption with keyword search scheme.” In this paper, we prove that they all suffer from security issues, and therefore, this challenging problem still remains open.
Similar content being viewed by others
Notes
For the sake of simplicity, we review the scheme in single keyword mode. However, the flaws we report apply to the conjunctive case as well.
For the sake of simplicity, we review the scheme in single receiver mode. However, the flaw we report applies to the multiple receiver mode as well.
References
Song DX, Wagner D, Perrig A (2000) Practical techniques for searches on encrypted data. IEEE Symposium on Security and Privacy, IEEE Computer Society, Washington, DC, pp 44–55
Curtmola R, Garay J, Kamara S, Ostrovsky R (2006) Searchable symmetric encryption: improved definitions and efficient constructions. CCS ACM, New York, pp 79–88
Boneh D, Crescenzo GD, Ostrovsky R, Persiano G (2004) Public key encryption with keyword search. EUROCRYPT (LNCS) 3027:506–522
Abdalla M, Bellare M, Catalano D, Kiltz E, Kohno T, Lange T, Malone-Lee J, Neven G, Paillier P, Shi H (2005) Searchable encryption revisited: consistency properties, relation to anonymous IBE, and extensions. Advances in cryptology—CRYPTO 2005: 25th annual international cryptology conference, USA, Springer, pp 205–222
Tian X, Wang Y (2008) ID-based encryption with keyword search scheme from bilinear pairings. 4th International Conference on Wireless Communications, Networking and Mobile Computing, IEEE, pp 1–4
Tomida K, Mohri M, Shiraishi Y (2014). Keyword searchable encryption with access control from a certain identity-based encryption. In: Park JJ, Stojmenovic I, Choi M, Xhafa F (eds) Future Tech 2013, LNEE, Springer, 276, 113–118
Tomida K, Doi H, Mohri M, Shiraishi Y (2015) Ciphertext divided anonymous HIBE and its transformation to identity-based encryption with keyword search. Journal of Information Processing 23(5):562–569
Liu J, Lai J, Huang X (2017) Dual trapdoor identity-based encryption with keyword search. Soft Comput 21(10):2599–2607
Byun JW, Rhee HS, Park H-A, Lee DH (2006) Off-line keyword guessing attacks on recent keyword search schemes over encrypted data. Workshop on Secure Data Management, Springer, pp 75–83
Pakniat N (2016) Public key encryption with keyword search and keyword guessing attack: a survey. Proceedings of the 13th International Iranian 155 Society of Cryptology Conference on Information Security and Cryptology (ISCISC), pp 1–4
Rhee HS, Park JH, Susilo W, Lee DH (2010) Trapdoor security in a searchable public-key encryption scheme with a designated tester. J Syst Softw 83(5):763–771
Wu TY, Tsai TT, Tseng YM (2014) Efficient searchable ID-based encryption with a designated server. Ann Telecommun 69(7):391–402
Wang XF, Mu Y, Chen R, Zhang XS (2016) Secure channel free id-based searchable encryption for peer-to-peer group. J Comput Sci Technol 31(5):1012–1027
Lu Y, Wang G, Li J, Shen J (2017) Efficient designated server identity-based encryption with conjunctive keyword search. Ann Telecommun 72(5):359–370
Goh EJ (2003) Secure indexes. Cryptology eprint archive, Report 2003/216
Shamir A (1984) Identity-based cryptosystems and signature schemes. Proceedings of CRYPTO '84, LNCS 196, Springer-Verlag, pp 47–53
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Noroozi, M., Karoubi, I. & Eslami, Z. Designing a secure designated server identity-based encryption with keyword search scheme: still unsolved. Ann. Telecommun. 73, 769–776 (2018). https://doi.org/10.1007/s12243-018-0653-4
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s12243-018-0653-4