Keyword Search Encryption Scheme Resistant Against Keyword-Guessing Attack by the Untrusted Server

Expand
  • (Department of Computer Science and Information Engineering, National Chiayi University, Chiayi 60004, Taiwan, China)

Online published: 2014-10-13

Abstract

The user data stored in an untrusted server, such as the centralized data center or cloud computing server, may be dangerous of eavesdropping if the data format is a plaintext. However, the general ciphertext is difficult to search and thus limited for practical usage. The keyword search encryption is a helpful mechanism that provides a searchable ciphertext for some predefined keywords. The previous studies failed to consider the attack from the data storage server to guess the keyword. This kind of attack may cause some critical information revealed to the untrusted server. This paper proposes a new keyword search encryption model that can effectively resist the keyword-guessing attack performed by the untrusted data storage (testing) server. The testing (query) secret is divided into multiple shares so that the security can be guaranteed if the servers cannot conspire with each other to retrieve all shares of the secret.

Cite this article

WANG Chih-hung* (王智弘), TU Tai-yuan (涂泰源) . Keyword Search Encryption Scheme Resistant Against Keyword-Guessing Attack by the Untrusted Server[J]. Journal of Shanghai Jiaotong University(Science), 2014 , 19(4) : 440 -442 . DOI: 10.1007/s12204-014-1522-6

References

[1] Boneh D, Grescenzo G D, Ostrovsky R, et al. Public key encryption with keyword Search [C]//Proceedings of Eurocrypt’04, LNCS 3027. Berlin,Germany: Springer-Verlag, 2004: 506-522.
[2] Beak J, Safavi-Naini R, Susilo W. Public key encryption with keyword search revised [C]//Proceedings of the International Conference on Computational Science and Its Applications (ICCSA ’08). Berlin:Springer-Verlag, 2008: 1249-1259.
[3] Park J H. Efficient hidden vector encryption for conjunctive queries on encrypted data [J]. IEEE Transactions on Knowledge and Data Engineering, 2011,23(10): 1483-1497.
[4] Zhang B, Zhang F. An efficient public key encryption with conjunctive-subset keywords search [J]. Journal of Network and Computer Applications, 2011, 34(1):262-267.
[5] Byun J W, Rhee H S, Park H A, et al. Offline keyword guessing attacks on recent keyword search schemes over encrypted data [C]//Proceedings of Secure Data Management, Third VLDB Workshop SDM’06, LNCS 4156. Berlin, Germany: Springer-Verlag, 2006: 75-83.
[6] Rhee H S, Susilo W, Kim H J. Secure searchable public key encryption scheme against keyword guessing attacks [J]. IEICE Electronics Express, 2009, 6(5):237-243.
[7] Jeong I R, Kwon J O, Hong D, et al. Constructing PEKS schemes secure against keyword guessing attacks is possible? [J] Computer Communications,2009, 32(2): 394-396.

Options
Outlines

/