Skip to main content

Keyword Attacks and Privacy Preserving in Public-Key-Based Searchable Encryption

  • Reference work entry
  • First Online:
  • 66 Accesses

Definitions

Keyword privacy, Keyword-guessing attacks, Searchable encryption, Public key.

Overview

The notion of public key encryption with keyword search (PEKS) provides a flexible and efficient approach to retrieve encrypted data stored in a remote server. A main threat in PEKS is the keyword guessing attack, where disclosed keywords leak the associated data and the user’s interest. This gives rise to that the keyword privacy becomes a concern in searchable encryption. In this paper, we present a brief history of keyword privacy in searchable encryption. We make a systematic investigation of keyword privacy issue in public key-based searchable encryption. We describe keyword guessing attacks in a general PEKS scheme. According to different attackers, we refine inherent reasons and summarize enhancement achievements. This preserves the keyword privacy and provides guidance for the secure development of searchable encryption.

Introduction

Driven by economic benefits, cloud-based...

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   849.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD   999.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  • Bethencourt J, Song DX, Waters B (2006) New constructions and practical applications for private stream searching (extended abstract). In: S&P 2006, pp 132–139

    Google Scholar 

  • Boneh D, Franklin MK (2001) Identity-based encryption from the weil pairing. In: Kilian J (ed) CRYPTO. LNCS 2001, vol 2139, pp 213–229

    Google Scholar 

  • Boneh D, Waters B (2007) Conjunctive, subset, and range queries on encrypted data. In: Vadhan SP (ed) TCC 2007. LNCS, vol 4392, pp 535–554

    Google Scholar 

  • Boneh D, Crescenzo GD, Ostrovsky R, Persiano G (2004) Public key encryption with keyword search. In: Cachin C, Camenisch J (eds) EUROCRYPT 2004. LNCS, vol 3027, pp 506–522

    Chapter  Google Scholar 

  • Bost R, Minaud B, Ohrimenko O (2017) Forward and backward private searchable encryption from constrained cryptographic primitives. In: Thuraisingham BM, Evans D, Malkin T, Xu D (eds) CCS 2017, pp 1465–1482

    Google Scholar 

  • Byun JW, Rhee HS, Park H, Lee DH (2008) Off-line keyword guessing attacks on recent keyword search schemes over encrypted data. In: Jonker W, Petkovic M (eds) Third VLDB workshop, SDM 2006. LNCS, vol 4165, pp 75–83

    Google Scholar 

  • Chen R, Mu Y, Yang G, Guo F, Wang X (2015) A new general framework for secure public key encryption with keyword search. In: Foo E, Stebila D (eds) ACISP 2015. LNCS, vol 9144, pp 59–76

    Google Scholar 

  • Fang L, Susilo W, Ge C, Wang J (2013) Public key encryption with keyword search secure against keyword guessing attacks without random oracle. Inf Sci 238:221–241

    Article  MathSciNet  MATH  Google Scholar 

  • Huang Q, Li H (2017) An efficient public-key searchable encryption scheme secure against inside keyword guessing attacks. Inf Sci 403:1–14

    Article  Google Scholar 

  • Jiang P, Mu Y, Guo F, Wang X, Wen Q (2016a) Online/offline ciphertext retrieval on resource constrained devices. Comput J 59(7):955–969

    Article  Google Scholar 

  • Jiang P, Mu Y, Guo F, Wen Q (2016b) Public key encryption with authorized keyword search. In: Liu JK, Steinfeld R (eds) ACISP 2016. LNCS, vol 9723, pp 170–186

    Google Scholar 

  • Jiang P, Mu Y, Guo F, Wen Q (2017a) Private keyword-search for database systems against insider attacks. J Comput Sci Technol 32(3):599–617

    Article  MathSciNet  Google Scholar 

  • Jiang P, Mu Y, Guo F, Wen Q (2017b) Secure-channel free keyword search with authorization in manager-centric databases. Comput Secur 69:50–64

    Article  Google Scholar 

  • Kamara S, Moataz T (2017) Boolean searchable symmetric encryption with worst-case sub-linear complexity. In: Coron J, Nielsen JB (eds) EUROCRYPT 2017. LNCS, vol 10212, pp 94–124

    Chapter  Google Scholar 

  • Kim KS, Kim M, Lee D, Park JH, Kim W (2017) Forward secure dynamic searchable symmetric encryption with efficient updates. In: Thuraisingham BM, Evans D, Malkin T, Xu D (eds) CCS 2017, pp 1449–1463

    Google Scholar 

  • Park DJ, Kim K, Lee PJ (2004) Public key encryption with conjunctive field keyword search. In: Lim CH, Yung M (eds) WISA 2004. LNCS, vol 3325, pp 73–86

    Google Scholar 

  • Rhee HS, Park JH, Susilo W, Lee DH (2009a) Improved searchable public key encryption with designated tester. In: Li W, Susilo W, Tupakula UK, Safavi-Naini R, Varadharajan V (eds) ASIACCS 2009, pp 376–379

    Google Scholar 

  • Rhee HS, Susilo W, Kim H (2009b) Secure searchable public key encryption scheme against keyword guessing attacks. IEICE Electron Expr 6(5):237–243

    Article  Google Scholar 

  • Rhee HS, Park JH, Susilo W, Lee DH (2010) Trapdoor security in a searchable public-key encryption scheme with a designated tester. J Syst Softw 83(5):763–771

    Article  Google Scholar 

  • Shi J, Lai J, Li Y, Deng RH, Weng J (2014) Authorized keyword search on encrypted data. In: Kutylowski M, Vaidya J (eds) ESORICS 2014. LNCS, vol 8712, pp 419–435

    Google Scholar 

  • Song DX, Wagner D, Perrig A (2000) Practical techniques for searches on encrypted data. In: S&P 2000, pp 44–55

    Google Scholar 

  • Sun W, Yu S, Lou W, Hou YT, Li H (2016) Protecting your right: verifiable attribute-based keyword search with fine-grained owner-enforced search authorization in the cloud. IEEE Trans Parallel Distrib Syst 27(4): 1187–1198

    Article  Google Scholar 

  • Sun L, Xu C, Zhang M, Chen K, Li H (2018) Secure searchable public key encryption against insider keyword guessing attacks from indistinguishability obfuscation. Sci China Inf Sci 61(3):038106

    Article  Google Scholar 

  • Wang CH, Tu TY (2014) Keyword search encryption scheme resistant against keyword-guessing attack by the untrusted server. J Shanghai Jiaotong Univ (Sci) 19(4):440–442

    Article  Google Scholar 

  • Yang Y, Ma M (2016) Conjunctive keyword search with designated tester and timing enabled proxy re-encryption function for e-health clouds. IEEE Trans Inf Forensics Secur 11(4):746–759

    Google Scholar 

  • Yau W, Heng S, Goi B (2008) Off-Line keyword guessing attacks on recent public key encryption with keyword search schemes. In: Rong C, Jaatun MG, Sandnes FE, Yang LT, Ma J (eds) ATC 2008. LNCS, vol 5060, pp 100–105

    Google Scholar 

  • Zheng Q, Xu S, Ateniese G (2014) VABKS: verifiable attribute-based keyword search over outsourced encrypted data. In: INFOCOM 2014, pp 522–530

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Willy Susilo .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this entry

Check for updates. Verify currency and authenticity via CrossMark

Cite this entry

Jiang, P., Guo, F., Susilo, W., Han, J. (2019). Keyword Attacks and Privacy Preserving in Public-Key-Based Searchable Encryption. In: Sakr, S., Zomaya, A.Y. (eds) Encyclopedia of Big Data Technologies. Springer, Cham. https://doi.org/10.1007/978-3-319-77525-8_232

Download citation

Publish with us

Policies and ethics