Skip to main content

A Fast Public Key Searchable Encryption Scheme Against Inside Keyword Attacks

  • Conference paper
  • First Online:
Computer Supported Cooperative Work and Social Computing (ChineseCSCW 2019)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 1042))

  • 1026 Accesses

Abstract

With the advent of the era of cloud computing technology, the security and search efficiency of ciphertext retrieval have has become the focus of research. However, in the traditional encryption schemes, most of them only solve the problem of defending against external keyword guessing attacks. We tend to ignore malicious third party cloud server provider, which sometimes tries to guess the user’s ciphertext information through the trapdoor or keywords. For the sake of improving the security of ciphertext, an inside keyword attack scheme on the basis of inverted index is proposed. Firstly, When building inverted indexes, the private key of the data owner is added to protect against the attack of malicious server. Secondly, an efficient public key ciphertext search scheme of parallel encryption index structure is introduced to realize the parallel search task of keywords. Compared with the traditional public-key searchable encryption, our scheme not only improves the search efficiency but also improves the security of the system.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Song, D.X., Wagner, D., Perrig, A.: Practical techniques for searches on encrypted data. In: Proceeding 2000 IEEE Symposium on Security and Privacy, pp. 44–55. IEEE (2000)

    Google Scholar 

  2. Boneh, D., Di Crescenzo, G., Ostrovsky, R., Persiano, G.: Public key encryption with keyword search. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 506–522. Springer, Heidelberg (2004). https://doi.org/10.1007/978-3-540-24676-3_30

    Chapter  Google Scholar 

  3. Byun, J.W., Rhee, H.S., Park, H.A., Lee, D.H.: Off-line keyword guessing attacks on recent keyword search schemes over encrypted data. In: Jonker, W., Petković, M. (eds.) SDM 2006. LNCS, vol. 4165, pp. 75–83. Springer, Heidelberg (2006). https://doi.org/10.1007/11844662_6

    Chapter  Google Scholar 

  4. Rhee, H.S., Park, J.H., Susilo, W.: Trapdoor security in a searchable public-key encryption scheme with a designated tester. J. Syst. Softw. 83(5), 763–771 (2010)

    Article  Google Scholar 

  5. Wang, B., Song, W., Lou, W., Hou, Y.T.: Inverted index based multi-keyword public-key searchable encryption with strong privacy guarantee. In: 2015 IEEE Conference on Computer Communications (INFOCOM), pp. 2092–2100. IEEE (2015)

    Google Scholar 

  6. Yanguo, P., Jiangtao, C., Changgen, P., Zuobin, Y.: Certificateless public key encryption with keyword search. China Commun. 11(11), 100–113 (2015)

    Article  Google Scholar 

  7. Huang, Q., Li, H.: An efficient public-key searchable encryption scheme secure against inside keyword guessing attacks. Inf. Sci. 403, 1–14 (2017)

    Article  Google Scholar 

  8. Wang, C.H., Tu, T.Y.: Keyword search encryption scheme resistant against keyword-guessing attack by the untrusted server. J. Shanghai Jiaotong Univ. (Sci.) 19(4), 440–442 (2014)

    Article  Google Scholar 

  9. Fang, L., Susilo, W., Ge, C., Wang, J.: Public key encryption with keyword search secure against keyword guessing attacks without random oracle. Inf. Sci. 238, 221–241 (2013)

    Article  MathSciNet  Google Scholar 

  10. Yau, W.C., Heng, S.H., Goi, B.M.: Off-line keyword guessing attacks on recent public key encryption with keyword search schemes. In: Rong, C., Jaatun, M.G., Sandnes, F.E., Yang, L.T., Ma, J. (eds.) ATC 2008. LNCS, vol. 5060, pp. 100–105. Springer, Heidelberg (2008). https://doi.org/10.1007/978-3-540-69295-9_10

    Chapter  Google Scholar 

  11. Sun, L., Xu, C., Zhang, M., Chen, K., Li, H.: Secure searchable public key encryption against insider keyword guessing attacks from indistinguishability obfuscation. Sci. China Inf. Sci. 61(3), 038106:1–038106:3 (2018)

    Article  Google Scholar 

  12. Zhang, R., Xue, R., Yu, T., Liu, L.: Dynamic and efficient private keyword search over inverted index–based encrypted data. ACM Trans. Internet Technol. 16(3), 21 (2016)

    Article  Google Scholar 

  13. Song, D.X., Wagner, D., Perrig, A.: Practical techniques for searches on encrypted data. In: Proceeding 2000 IEEE Symposium on Security and Privacy, pp. 44–55. IEEE (2000)

    Google Scholar 

  14. Lynn, B.: PBC Library. https://crypto.stanford.edu/pbc/

  15. Xu, P., Tang, X., Wang, W., Jin, H., Yang, L.T.: Fast and parallel keyword search over public-key ciphertexts for cloud-assisted IoT. IEEE Access 5, 24775–24784 (2017)

    Article  Google Scholar 

  16. Wang, B., Song, W., Lou, W., Hou, Y.T.: Inverted index based multi-keyword public-key searchable encryption with strong privacy guarantee. In: 2015 IEEE Conference on Computer Communications (INFOCOM), pp. 2092–2100. IEEE (2015)

    Google Scholar 

  17. Chen, R., Mu, Y., Yang, G., Guo, F., Wang, X.: Dual-server public-key encryption with keyword search for secure cloud storage. IEEE Trans. Inf. Forensics Secur. 11(4), 789–798 (2015)

    Google Scholar 

  18. Saito, T., Nakanishi, T.: Designated-senders public-key searchable encryption secure against keyword guessing attacks. In: 2017 Fifth International Symposium on Computing and Networking (CANDAR), pp. 496–502. IEEE (2017)

    Google Scholar 

  19. Xu, P., Wu, Q., Wang, W., Susilo, W., Domingo-Ferrer, J., Jin, H.: Generating searchable public-key ciphertexts with hidden structures for fast keyword search. IEEE Trans. Inf. Forensics Secur. 10(9), 1993–2006 (2015)

    Article  Google Scholar 

  20. Ding, S., Li, Y., Zhang, J., Chen, L., Wang, Z., Xu, Q.: An efficient and privacy-preserving ranked fuzzy keywords search over encrypted cloud data. In: 2016 International Conference on Behavioral, Economic and Socio-cultural Computing (BESC), pp. 1–6. IEEE (2016)

    Google Scholar 

  21. Du, M., Wang, Q., He, M., Weng, J.: Privacy-preserving indexing and query processing for secure dynamic cloud storage. IEEE Trans. Inf. Forensics Secur. 13(9), 2320–2332 (2018)

    Article  Google Scholar 

  22. Shao, Z.Y., Yang, B.: On security against the server in designated tester public key encryption with keyword search. Formation Process. Lett. 115(12), 957–961 (2015)

    Article  MathSciNet  Google Scholar 

Download references

Acknowledgment

This work is supported by the National Natural Science Foundation of China (61762008) and the Natural Science Foundation Project of Guangxi (2016GXNSFAA 380115).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ruwei Huang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Liu, C., Chen, N., Huang, R., Xie, Y. (2019). A Fast Public Key Searchable Encryption Scheme Against Inside Keyword Attacks. In: Sun, Y., Lu, T., Yu, Z., Fan, H., Gao, L. (eds) Computer Supported Cooperative Work and Social Computing. ChineseCSCW 2019. Communications in Computer and Information Science, vol 1042. Springer, Singapore. https://doi.org/10.1007/978-981-15-1377-0_4

Download citation

  • DOI: https://doi.org/10.1007/978-981-15-1377-0_4

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-15-1376-3

  • Online ISBN: 978-981-15-1377-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics