Definitions
Keyword privacy, Keyword-guessing attacks, Searchable encryption, Public key.
Overview
The notion of public key encryption with keyword search (PEKS) provides a flexible and efficient approach to retrieve encrypted data stored in a remote server. A main threat in PEKS is the keyword guessing attack, where disclosed keywords leak the associated data and the user’s interest. This gives rise to that the keyword privacy becomes a concern in searchable encryption. In this paper, we present a brief history of keyword privacy in searchable encryption. We make a systematic investigation of keyword privacy issue in public key-based searchable encryption. We describe keyword guessing attacks in a general PEKS scheme. According to different attackers, we refine inherent reasons and summarize enhancement achievements. This preserves the keyword privacy and provides guidance for the secure development of searchable encryption.
Introduction
Driven by economic benefits, cloud-based...
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Bethencourt J, Song DX, Waters B (2006) New constructions and practical applications for private stream searching (extended abstract). In: S&P 2006, pp 132–139
Boneh D, Franklin MK (2001) Identity-based encryption from the weil pairing. In: Kilian J (ed) CRYPTO. LNCS 2001, vol 2139, pp 213–229
Boneh D, Waters B (2007) Conjunctive, subset, and range queries on encrypted data. In: Vadhan SP (ed) TCC 2007. LNCS, vol 4392, pp 535–554
Boneh D, Crescenzo GD, Ostrovsky R, Persiano G (2004) Public key encryption with keyword search. In: Cachin C, Camenisch J (eds) EUROCRYPT 2004. LNCS, vol 3027, pp 506–522
Bost R, Minaud B, Ohrimenko O (2017) Forward and backward private searchable encryption from constrained cryptographic primitives. In: Thuraisingham BM, Evans D, Malkin T, Xu D (eds) CCS 2017, pp 1465–1482
Byun JW, Rhee HS, Park H, Lee DH (2008) Off-line keyword guessing attacks on recent keyword search schemes over encrypted data. In: Jonker W, Petkovic M (eds) Third VLDB workshop, SDM 2006. LNCS, vol 4165, pp 75–83
Chen R, Mu Y, Yang G, Guo F, Wang X (2015) A new general framework for secure public key encryption with keyword search. In: Foo E, Stebila D (eds) ACISP 2015. LNCS, vol 9144, pp 59–76
Fang L, Susilo W, Ge C, Wang J (2013) Public key encryption with keyword search secure against keyword guessing attacks without random oracle. Inf Sci 238:221–241
Huang Q, Li H (2017) An efficient public-key searchable encryption scheme secure against inside keyword guessing attacks. Inf Sci 403:1–14
Jiang P, Mu Y, Guo F, Wang X, Wen Q (2016a) Online/offline ciphertext retrieval on resource constrained devices. Comput J 59(7):955–969
Jiang P, Mu Y, Guo F, Wen Q (2016b) Public key encryption with authorized keyword search. In: Liu JK, Steinfeld R (eds) ACISP 2016. LNCS, vol 9723, pp 170–186
Jiang P, Mu Y, Guo F, Wen Q (2017a) Private keyword-search for database systems against insider attacks. J Comput Sci Technol 32(3):599–617
Jiang P, Mu Y, Guo F, Wen Q (2017b) Secure-channel free keyword search with authorization in manager-centric databases. Comput Secur 69:50–64
Kamara S, Moataz T (2017) Boolean searchable symmetric encryption with worst-case sub-linear complexity. In: Coron J, Nielsen JB (eds) EUROCRYPT 2017. LNCS, vol 10212, pp 94–124
Kim KS, Kim M, Lee D, Park JH, Kim W (2017) Forward secure dynamic searchable symmetric encryption with efficient updates. In: Thuraisingham BM, Evans D, Malkin T, Xu D (eds) CCS 2017, pp 1449–1463
Park DJ, Kim K, Lee PJ (2004) Public key encryption with conjunctive field keyword search. In: Lim CH, Yung M (eds) WISA 2004. LNCS, vol 3325, pp 73–86
Rhee HS, Park JH, Susilo W, Lee DH (2009a) Improved searchable public key encryption with designated tester. In: Li W, Susilo W, Tupakula UK, Safavi-Naini R, Varadharajan V (eds) ASIACCS 2009, pp 376–379
Rhee HS, Susilo W, Kim H (2009b) Secure searchable public key encryption scheme against keyword guessing attacks. IEICE Electron Expr 6(5):237–243
Rhee HS, Park JH, Susilo W, Lee DH (2010) Trapdoor security in a searchable public-key encryption scheme with a designated tester. J Syst Softw 83(5):763–771
Shi J, Lai J, Li Y, Deng RH, Weng J (2014) Authorized keyword search on encrypted data. In: Kutylowski M, Vaidya J (eds) ESORICS 2014. LNCS, vol 8712, pp 419–435
Song DX, Wagner D, Perrig A (2000) Practical techniques for searches on encrypted data. In: S&P 2000, pp 44–55
Sun W, Yu S, Lou W, Hou YT, Li H (2016) Protecting your right: verifiable attribute-based keyword search with fine-grained owner-enforced search authorization in the cloud. IEEE Trans Parallel Distrib Syst 27(4): 1187–1198
Sun L, Xu C, Zhang M, Chen K, Li H (2018) Secure searchable public key encryption against insider keyword guessing attacks from indistinguishability obfuscation. Sci China Inf Sci 61(3):038106
Wang CH, Tu TY (2014) Keyword search encryption scheme resistant against keyword-guessing attack by the untrusted server. J Shanghai Jiaotong Univ (Sci) 19(4):440–442
Yang Y, Ma M (2016) Conjunctive keyword search with designated tester and timing enabled proxy re-encryption function for e-health clouds. IEEE Trans Inf Forensics Secur 11(4):746–759
Yau W, Heng S, Goi B (2008) Off-Line keyword guessing attacks on recent public key encryption with keyword search schemes. In: Rong C, Jaatun MG, Sandnes FE, Yang LT, Ma J (eds) ATC 2008. LNCS, vol 5060, pp 100–105
Zheng Q, Xu S, Ateniese G (2014) VABKS: verifiable attribute-based keyword search over outsourced encrypted data. In: INFOCOM 2014, pp 522–530
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this entry
Cite this entry
Jiang, P., Guo, F., Susilo, W., Han, J. (2019). Keyword Attacks and Privacy Preserving in Public-Key-Based Searchable Encryption. In: Sakr, S., Zomaya, A.Y. (eds) Encyclopedia of Big Data Technologies. Springer, Cham. https://doi.org/10.1007/978-3-319-77525-8_232
Download citation
DOI: https://doi.org/10.1007/978-3-319-77525-8_232
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-77524-1
Online ISBN: 978-3-319-77525-8
eBook Packages: Computer ScienceReference Module Computer Science and Engineering