Open Access Open Access  Restricted Access Subscription Access

A New Instance for Dual-server Public Key Encryption with Keyword Search

Sunil Kumar

Abstract


Searchable encryption is of increasing interest for protecting the data privacy in secure searchable cloud storage. In this work, we investigate the security of a well-known cryptographic primitive, namely Public Key Encryption with Keyword Search (PEKS) which is very useful in many applications of cloud storage. Unfortunately, it has been shown that the traditional PEKS framework suffers from an inherent insecurity called inside Keyword Guessing Attack (KGA) launched by the malicious server. To address this security vulnerability, we propose a new PEKS framework named Dual-Server Public Key Encryption with Keyword Search (DS-PEKS). As another main contribution, we define a new variant of the Smooth Projective Hash Functions (SPHFs) referred to as linear and homomorphic SPHF (LH-SPHF). We then show a generic construction of secure DS-PEKS from LH-SPHF. To illustrate the feasibility of our new framework, we provide an efficient instantiation of the general framework from a DDH-based LH-SPHF and show that it can achieve the strong security against inside KGA.


Full Text:

PDF

References


M. Abdalla, M. Bellare, D. Catalano, E. Kiltz, T. Kohno, T. Lange, J. Malone-Lee, G. Neven, P. Paillier, and H. Shi, “Searchable encryption revisited: Consistency properties, relation to anonymous ibe, and extensions,” J. Cryptology, vol. 21, no. 3, pp. 350–391, 2008

D. Boneh, G. D. Crescenzo, R. Ostrovsky, and G. Persiano, “Public key encryption with keyword search,” in EUROCRYPT’ 04, ser. LNCS, vol. 3027. Springer, 2004, pp. 506–522.

M. Bellare, M. Fischlin, A. O’Neill, and T. Ristenpart, “Deterministic encryption: Definitional equivalences a constructions without random oracles,” in CRYPTO’08, ser. LNCS, vol. 5157. Springer, 2008, pp. 360–378.

C. B¨osch, P. H. Hartel, W. Jonker, and A. Peter, “A survey of provably secure searchable encryption,” ACM Comput. Surv., vol. 47, no. 2, pp. 18:1–18:51, 2014.

M. Bellare and P. Rogaway, “Random oracles are practical: A paradigm for designing efficient protocols,” in CCS’93. ACM, 1993, pp. 62–73.

J. W. Byun, H. S. Rhee, H. Park, and D. H. Lee, “Offline keyword guessing attacks on recent keyword search schemes over encrypted data,” in Secure Data Management, SDM’06, ser. LNCS, vol. 4165. Springer, 2006, pp. 75–83.

J. Baek, R. Safavi-Naini, and W. Susilo, “Public key encryption with keyword search revisited,” in Computational Science and Its Applications - ICCSA’08, ser. LNCS, vol. 5072. Springer, 2008, pp. 1249–1259.

D. Boneh and B. Waters, “Conjunctive, subset, and range queries on encrypted data,” in TCC’07, ser. LNCS, vol. 4392. Springer, 2007, pp. 535–554.

R. Canetti, O. Goldreich, and S. Halevi, “The random oracle methodology, revisited,” J. ACM, vol. 51, no. 4, pp. 557– 594, 2004.


Refbacks

  • There are currently no refbacks.