• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations
Advanced Search Include Citations

and J.Wang, “Public key encryption with keyword search secure against keyword guessing attacks without random oracle,” (2013)

by L Fang, W Susilo, C Ge
Venue:Inf. Sci.,
Add To MetaCart

Tools

Sorted by:
Results 1 - 6 of 6

Search Pattern Leakage in Searchable Encryption: Attacks and New Constructions ABSTRACT

by Chang Liu, Mingzhong Wang, Liehuang Zhu
"... Searching on remote encrypted data (commonly known as searchable encryption) is becoming an important technique in secure data outsourcing, since it allows users to outsource encrypted data to the third party and maintains the keyword searching on the data at the same time. It has been widely accept ..."
Abstract - Cited by 2 (0 self) - Add to MetaCart
Searching on remote encrypted data (commonly known as searchable encryption) is becoming an important technique in secure data outsourcing, since it allows users to outsource encrypted data to the third party and maintains the keyword searching on the data at the same time. It has been widely accepted in the literature that searchable encryption techniques should leak as little information as possible to the third party. An early classical method called oblivious RAM hides all information at the cost of poly-logarithmic computation and communication overheads, which turns out to be impractical in the real world applications (e.g., cloud computing). A number of efficient searchable encryption schemes have been proposed under weaker security guarantees afterwards, however, such schemes leak statistical information about the user’s search pattern. In this paper, we show that the search pattern leakage can result in non-trivial risks. As pioneer work, we present two concrete attack models exploiting user’s search pattern and some auxiliary background knowledge aiming to disclose the underlying keywords of user’s queries. To resist these attacks, we develop two new searchable encryption constructions that hide the search pattern. Our constructions are designed to be independent from the underlying searchable encryption scheme. Our experiments, which are based on the real world dataset, demonstrate the effectiveness and efficiency of proposed attack models and new constructions.

Refine the Concept of Public Key Encryption with Delegated Search

by Qiang Tang, Yuanjie Zhao, Xiaofeng Chen, Hua Ma , 2012
"... Abstract. We revisit the concept of public key encryption with delegated keyword search (PKEDS), a concept proposed by Ibraimi et al. A PKEDS scheme allows a receiver to authorize third-party server(s) to search in two ways: either according to a message chosen by the server itself or according to a ..."
Abstract - Cited by 2 (1 self) - Add to MetaCart
Abstract. We revisit the concept of public key encryption with delegated keyword search (PKEDS), a concept proposed by Ibraimi et al. A PKEDS scheme allows a receiver to authorize third-party server(s) to search in two ways: either according to a message chosen by the server itself or according to a trapdoor sent by the receiver. We show that the existing formulation has some defects and the proposed scheme is unnecessarily inefficient. Based on our analysis, we present a refined formulation of the primitive with a new security model. We then propose a new PKEDS scheme, which is proven secure and much more efficient than the original scheme by Ibraimi et al. 1
(Show Context)

Citation Context

...e [6] was based on the unrealistic assumption of a secure channel between the receiver and the server. Baek et al. [3] proposed an efficient PEKS scheme which can remove a secure channel. Fang et al. =-=[15]-=- proposed an efficient scheme without using any secure channels and its security does not use random oracles. The papers [12] [33] [29] [24] studied the off-line keyword guessing attacks on PEKS. In f...

A Review of Research on Dual -Server Public- Key Encryption with Keyword Search for Secure Cloud Storage

by Shaikh Tofik , S , Gule Sheetal , J , 2017
"... ABSTRACT an inalienable instability called inside Brut force keyword guessing attack propelled by the pernicious server. To address this security defenselessness, we propose another PEKS system named double server PEKS (DS-PEKS). As another principle commitment, we characterize another variation of ..."
Abstract - Add to MetaCart
ABSTRACT an inalienable instability called inside Brut force keyword guessing attack propelled by the pernicious server. To address this security defenselessness, we propose another PEKS system named double server PEKS (DS-PEKS). As another principle commitment, we characterize another variation of the smooth projective hash capacities (SPHFs) alluded to as direct and homomorphic SPHF (LH-SPHF). We then demonstrate a bland development of secure DS-PEKS from LH-SPHF. To outline the plausibility of our new structure, we proposed system which makes system easy to handle and effective mechanism to handle complex task with better result with dual server public key encryption of the proposed scheme.
(Show Context)

Citation Context

...the evacuation of secure channel between the beneficiary and the server to make PEKS down to earth. Lamentably, the current development of PEKS secure against catchphrase speculating assault is just secure under the irregular prophet display, which does not mirror its security in this present reality. Moreover, there is no total definition that catches secure channel free PEKS plans that are secure against picked catchphrase assault, picked ciphertext assault, and against watchword speculating assaults, despite the fact that these thoughts appear to be the most pragmatic use of PEKS primitives[6]. Aanother system, called secure server-assignment open key encryption with catchphrase seek (SPEKS), was acquainted with enhance the security of dPEKS (which experiences the on-line catchphrase speculating assault) by characterizing another security demonstrate 'unique ciphertext indistinguishability’[7]. 3. EXISTING SYSTEM In a PEKS framework, utilizing the recipient's open key, the sender connects some scrambled catchphrases (alluded to as PEKS ciphertexts) with the encoded information. The recipient then sends the trapdoor of a to-be-hunt Vol-3 Issue-1 2017 IJARIIE-ISSN(O)-2395-4396 3667 w...

Generic Constructions of Secure-Channel Free Searchable Encryption with Adaptive Security

by Keita Emura, Atsuko Miyaji, Mohammad Shahriar Rahman, Kazumasa Omote , 2013
"... ..."
Abstract - Add to MetaCart
Abstract not found

encryption

by Zhi-yi Shao, Bo Yang
"... Compiler for trapdoor security in searchable public key ..."
Abstract - Add to MetaCart
Compiler for trapdoor security in searchable public key
(Show Context)

Citation Context

...r,sRhee et al.’s scheme [5] runs in the randomsoracle model, and the attacker cannot proposesthe Test query in their security model, whichsmeans that the attacker’s ability is limited.sSo Fang et al. =-=[6]-=- improved Rhee et al.’sssecurity model and proposed IND-KGAs(Indistinguishability against Keyword GuessingsAttacks) security, which gives the attacker mores1DOI : 02.IJIS.2015.1.3 N&N Global Technolog...

Searchable Encryption:New Approaches for Private Set Intersection

by Shao Zhi-yi, Yang Bo
"... Abstract: We introduce the technique of searchable encryption into the problem of secure two-party computation, and obtain novel approaches to accomplish Private Set Intersection (PSI). We present two protocols for PSI. The first one uses Baek’s Public Key Encryption with Multiple Keywords Search (M ..."
Abstract - Add to MetaCart
Abstract: We introduce the technique of searchable encryption into the problem of secure two-party computation, and obtain novel approaches to accomplish Private Set Intersection (PSI). We present two protocols for PSI. The first one uses Baek’s Public Key Encryption with Multiple Keywords Search (MPEKS) as the basic tool, and the second one uses Gu’s Public Key Encryption with Keyword Search (PEKS) as the basic tool. Baek’s MPEKS supports multiple keywords search, but it requires expensive MapToPoint operations. Although the computation complexity of the MapToPoint operation can be reduced by new techniques, it indeed influences the efficiency. A natural method is to find a searchable encryption which requires no MapToPoint operations. So, we present the second protocol based on Gu’s PEKS. Gu’s PEKS does not support multiple keywords search, however, it still can help us to improve the efficiency of PSI significantly. We aim to achieve PSI in computationally asymmetric settings such as Cloud Computing, and both of our two protocols gain linear computation complexity for the client. We assume that m denotes the cardinality of the client’s input set. Concretely, in the protocol based on MPEKS, the client needs to compute m multiplications, m MapToPoint operations and one modular exponentiation; and in the protocol based on PEKS, the client only needs to compute m multiplications, m ordinary hashes, and one modular exponentiation to get the intersection. Both protocols satisfy privacy with respect to semi-honest behaviors.
(Show Context)

Citation Context

... MapToPoint operations; but when we considersdifferent techniques for achieving PEKS, Gu’s variant [12] is much better.sTable 1. Comparison of operations to gain one trapdoors[16] [10] [18] [12] [19] =-=[20]-=- [25] [26]smultiplication 0 1 0 1 3 2 1 1sexponentiation 1 0 2 0 1 1 3 3sordinary hash 0 0 0 1 0 0 0 0smaptopoint 1 1 2 0 4 0 1 2s2.2.2 Definition, Construction and SecuritysIn the following, we will ...

Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University