2018
DOI: 10.1002/dac.3862
|View full text |Cite
|
Sign up to set email alerts
|

Constructing designated server public key encryption with keyword search schemes withstanding keyword guessing attacks

Abstract: Designated server public key encryption with keyword search (dPEKS) removes the secure channel requirement in public key encryption with keyword search (PEKS). With the dPEKS mechanism, a user is able to delegate the search tasks on the ciphertexts sent to him/her to a designated storage server without leaking the corresponding plaintexts. However, the current dPEKS framework inherently suffers from the security vulnerability caused by the keyword guessing (KG) attack. How to build the dPEKS schemes withstandi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(2 citation statements)
references
References 47 publications
0
2
0
Order By: Relevance
“…However, [28] still needs a secure channel in trapdoor transmission process. Recently, the PEKS schemes proposed in [29]- [31] also adopted similar idea by including a data sender's private key in the generation of keyword ciphertexts to solve the problem of inside keyword guessing attacks. Lattice-based schemes proposed in [32] and [33] employed preimage sampleable function to generate the authenticated keyword ciphertexts for resisting inside KGAs.…”
Section: Related Workmentioning
confidence: 99%
“…However, [28] still needs a secure channel in trapdoor transmission process. Recently, the PEKS schemes proposed in [29]- [31] also adopted similar idea by including a data sender's private key in the generation of keyword ciphertexts to solve the problem of inside keyword guessing attacks. Lattice-based schemes proposed in [32] and [33] employed preimage sampleable function to generate the authenticated keyword ciphertexts for resisting inside KGAs.…”
Section: Related Workmentioning
confidence: 99%
“…In a SE scheme, by generating some trapdoors associated with some keywords, users can ask the server to retrieve their desired data files such that the server is prevented from learning any partial information about the keywords and contents of the outsourced data files. The existing SE schemes can be categorized into public‐key SE (PKSE) schemes 9–12 and symmetric SE (SSE) schemes 13–16 . Although SSE schemes are significantly more efficient than PKSE schemes, they suffer from the critical and expensive key distribution 17 problem.…”
Section: Introductionmentioning
confidence: 99%