2009
DOI: 10.1016/j.comcom.2008.11.018
|View full text |Cite
|
Sign up to set email alerts
|

Constructing PEKS schemes secure against keyword guessing attacks is possible?

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
43
0

Year Published

2009
2009
2018
2018

Publication Types

Select...
8
1

Relationship

0
9

Authors

Journals

citations
Cited by 108 publications
(49 citation statements)
references
References 11 publications
1
43
0
Order By: Relevance
“…4.3 defines the adversary with capability equivalent to that of the IND-CKA PEKS model and the IND-CKA dPEKS model of [10,11] respectively, i.e., the adversary has oracle access to both the Trapdoor and dTest functions. This also corroborates well with the result of [7] that showed consistency implies impossibility against KGA, where the implication proof required that the KG adversary has access to the Test function and be given the challenge ciphertext C * and challenge trapdoor T * w .…”
Section: Security Models For (D)peks Against Kg−ckasupporting
confidence: 77%
See 1 more Smart Citation
“…4.3 defines the adversary with capability equivalent to that of the IND-CKA PEKS model and the IND-CKA dPEKS model of [10,11] respectively, i.e., the adversary has oracle access to both the Trapdoor and dTest functions. This also corroborates well with the result of [7] that showed consistency implies impossibility against KGA, where the implication proof required that the KG adversary has access to the Test function and be given the challenge ciphertext C * and challenge trapdoor T * w .…”
Section: Security Models For (D)peks Against Kg−ckasupporting
confidence: 77%
“…Yau et al [14] later showed some similar attacks on dPEKS and PEKS schemes of [2,3]. In a different vein, Jeong et al [7] showed that consistency implies insecurity to keyword guessing attacks in PEKS, where consistency means that it is not possible to find two keywords such that the Test function states that the PEKS ciphertext of one keyword and the trapdoor for the other keyword contain the same keyword.…”
Section: Introductionmentioning
confidence: 99%
“…As observed by Jeong et al [20], in the case when the attacker is the server, SCF-PEKS consistency implies insecurity against keyword guessing attacks. To highlight this observation, let us consider the work presented in [29].…”
Section: Two Types Of Attackers In Scf-peksmentioning
confidence: 75%
“…Furthermore, the subsequent papers [9,18] investigated the secure combination of public key encryption with keyword search (PEKS) with public key data encryption (PKE). Since the fact that keywords are chosen from much smaller space than passwords and users usually use well-known keywords for search, the work in [6,13,15,17] studied the off-line keyword guessing attacks on PEKS.…”
Section: Related Workmentioning
confidence: 99%