Abstract
Public key encryption with keyword search is a useful primitive that provides searchable ciphertexts for some predefined keywords. It allows a user to send a trapdoor to a storage server, which enables the latter to locate all encrypted data containing the keyword(s) encoded in the trapdoor. To remove the requirement of a secure channel between the server and the receiver in identity-based encryption with keyword search, Wu et al. proposed a designated server identity-based encryption scheme with keyword search. However, our cryptanalysis indicates that Wu et al.’s scheme fails in achieving the ciphertext indistinguishability. To overcome the security weakness in the scheme and offer the multiple-keyword search function, we put forward a designated server identity-based encryption scheme with conjunctive keyword search. In the random oracle model, we formally prove that the proposed scheme satisfies the ciphertext indistinguishability, the trapdoor indistinguishability and the off-line keyword-guessing attack security. Comparison analysis shows that it is efficient and practical.
Similar content being viewed by others
References
Abdalla M, Bellare M, Catarano D et al (2008) Searchable encryption revisited: consistency properties, relation to anonymous IBE, and extensions. J Cryptol 21(3):350–391
Baek J, Safavi-Naini R, Susilo W (2008) Public key encryption with keyword search revisited. In: Gervasi O, Murgante B, Lagan A, Taniar D, Mun Y, Gavrilova ML (eds) ICCSA 2008, LNCS, vol 5072. Springer, pp 1249–1259
Bellare M, Rogaway P (1993) Random oracles are practical: a paradigm for designing efficient protocols. In: 1993 ACM Conference on Computer and Communications Security. ACM, pp 62–73
Boneh D, Crescenzo G D, Ostrovsky R, et al (2004) Public key encryption with keyword search. In: Cachin C, Camenisch JL (eds) EUROCRYPT 2004, LNCS, vol 3027. Springer, pp 506–522
Boneh D, Waters B (2007) Conjunctive subset and range queries on encrypted data. In: Vadhan SP (ed) TCC 2007, LNCS, vol 4392. Springer, pp 535–554
Boyen X (2006) The BB1 identity-based cryptosystem: a standard for encryption and key encapsulation. IEEE Standard P1363.3, available at http://grouper.ieee.org/groups/1363/IBC/submissions/
Byun J, Rhee H, Park H, et al (2006) Off-line keyword guessing attacks on recent keyword search schemes over encrypted data. In: Jonker W, Petkovic M (eds) SDM 2006, LNCS, vol 4165. Springer, pp 75–83
Chen RM, Mu Y, Yang GM et al (2016) Server-aided public key encryption with keyword search. IEEE Trans Inf Forensics Secur. doi:10.1109/TIFS.2016.2599293
Chen RM, Mu Y, Yang GM et al (2016) Dual-server public-key encryption with keyword search for secure cloud storage. IEEE Trans Inf Forensics Secur 11(4):789–798
Chen YC (2015) SPEKS: secure server-designation public key encryption with keyword search against keyword guessing attacks. Comput J 58(4):922–933
Dong Q X, Guan Z, Wu L, et al (2013) Fuzzy keyword search over encrypted data in the public key setting. In: Wang JY, Xiong H, Ishikawa Y, Xu JL, Zhou JF (eds) WAIM 2013, LNCS, vol 7923. Springer, pp 729–740
Fang L M, Susilo W, Ge C P, et al (2009) A secure channel free public key encryption with keyword search scheme without random oracle. In: Garay J, Miyaji A, Otsuka A (eds) CANS 2009, LNCS, vol 5888. Springer, pp 248–258
Fu Z, Ren K, Shu J et al (2016) Enabling personalized search over encrypted outsourced data with efficiency improvement. IEEE Trans Parallel Distrib Syst 27(9):2546–2559
Fu Z, Sun X, Liu Q et al (2015) Achieving efficient cloud search services: multi-keyword ranked search over encrypted cloud data supporting parallel computing. IEICE Trans Commun E98-B(1):190–200
Fu Z, Wu X, Guan C et al (2016) Towards efficient multi-keyword fuzzy search over encrypted outsourced data with accuracy improvement. IEEE Trans Inf Forensics Secur. doi:10.1109/TIFS.2016.2596138
Guo LF, Yau WC (2015) Efficient secure-channel free public key encryption with keyword search for EMRs in cloud storage. J Med Syst. doi:10.1007/s10916-014-0178-y
Hu CY, Liu PT (2012) An enhanced searchable public key encryption scheme with a designated server and its extensions. J Comput 7(3):716–723
Hwang Y H, Lee P J (2007) Public key encryption with conjunctive keyword search and its extension to a multi-user system. In: Takagi T, Okamoto T, Okamoto E, Okamoto T (eds) Pairing 2007, LNCS, vol 4575. Springer, pp 2–22
Koji T, Masami M, Yoshiaki S (2014) Keyword searchable encryption with access control from a certain identity-based encryption. In: Park JJ, Stojmenovic I, Choi M, Xhafa F (eds) Future Tech 2013, LNEE, vol 276. Springer, pp 113–118
Koji T, Hiroshi D, Masami M et al (2015) Ciphertext divided anonymous HIBE and its transformation to identity-based encryption with keyword search. J Inf Process 23(5):562–569
Li J, Guo Y, Yu Q et al (2016) Provably secure identity-based encryption resilient to post-challenge continuous auxiliary inputs leakage. Secur Commun Netw 9(10):1016–1024
Li J, Lin X, Zhang Y, Han J (2016) KSF-OABE: outsourced attribute-based encryption with keyword search function for cloud storage. IEEE Trans Serv Comput. doi:10.1109/TSC.2016.2542813
Li J, Shi Y, Zhang Y (2015) Searchable ciphertext-policy attribute-based encryption with revocation in cloud storage. Int J Commun Syst. doi:10.1002/dac.2942
Li J, Teng M, Zhang Y et al (2016) A leakage-resilient CCA-secure identity-based encryption scheme. Comput J 59(7):1066–1075
Li J, Wang H, Zhang Y et al (2016) Ciphertext-policy attribute-based encryption with hidden access policy and testing. KSII Tran Internet Inf Sys 10(7):3339–3352
Li J, Yao W, Zhang Y et al (2016) Flexible and fine-grained attribute-based data storage in cloud computing. IEEE Trans Serv Comput. doi:10.1109/TSC.2016.2520932
Liu JN, Lai JZ, Huang XY (2015) Dual trapdoor identity-based encryption with keyword search. J Soft Comput. doi:10.1007/s00500-015-1960-6
Lv Z Q, Hong C, Zhang M, et al (2014) Expressive and secure searchable encryption in the public key setting. In: Chow SSM, Camenisch J, Hui LCK, Yiu SM (eds) ISC 2014, LNCS, vol 8783. Springer, pp 364–376
Park D, Kim K, Lee P (2004) Public key encryption with conjunctive field keyword search. In: Lim CH, Yung M (eds) WISA 2004, LNCS, vol 3325. Springer, pp 73–86
Qian H, Li J, Zhang Y et al (2015) Privacy preserving personal health record using multi-authority attribute-based encryption with revocation. Int J Inf Secur 14(6):487–497
Rhee H S, Park J H, Susilo W, et al (2009) Improved searchable public key encryption with designated tester. In: 4th International Symposium on ACM Symposium on Information, Computer and Communications Security. ACM, pp 376–379
Rhee HS, Park JH, Susilo W et al (2010) Trapdoor security in a searchable public key encryption scheme with a designated tester. J Syst Softw 83(5):763–771
Shamir A (1984) Identity-based cryptosystems and signature schemes. In: Blakley GR, Chaum D (eds) CRYPTO 1984, LNCS, vol 196. Springer, pp 47–53
Shao J, Cao Z, Liang X et al (2010) Proxy re-encryption with keyword search. Inf Sci 180(13):2576–2587
Song D, Wagner D, Perrig A (2000) Practical techniques for searching on encrypted data. In: 2000 I.E. symposium on Security and Privacy. IEEE, pp 44–55
Sun W, Yu S, Lou W et al (2016) Protecting your right: attribute-based keyword search with fine-grained owner-enforced search authorization in the cloud. IEEE Trans Parallel Distrib Syst 27(4):1187–1198
Tang Q, Chen L Q (2010) Public key encryption with registered keyword search. In: Martinelli F, Preneel B (eds) EuroPKI 2009, LNCS, vol 6391. Springer, pp 163–178
Tian X X, Wang Y (2008) ID-based encryption with keyword search scheme from bilinear pairings. In: 4th International Conference on Wireless Communications, Networking and Mobile Computing. IEEE, pp 1–4
Wang XF, Mu Y, Chen RM et al (2016) Secure channel free id-based searchable encryption for peer-to-peer group. J Comput Sci Technol 31(5):1012–1027
Wu TY, Tsai TT, Tseng YM (2014) Efficient searchable ID-based encryption with a designated server. Ann Telecommun 69(7):391–402
Xia Z, Wang X, Sun X et al (2015) A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data. IEEE Trans Parallel Distrib Syst 27(2):340–352
Yau W C, Heng S H, Goi B M (2008) Off-line keyword guessing attacks on recent public key encryption with keyword search schemes. In: Rong CM, Jaatun MG, Sandnes FE, Yang LT, Ma JH (eds) ATC 2008, LNCS, vol 5060. Springer, pp 100–105
Zhang B, Zhang F (2011) An efficient public key encryption with conjunctive-subset keywords search. J Netw Comput Appl 34(1):262–267
Zheng Q, Xu S, Ateniese G (2014) VABKS: verifiable attribute-based keyword search over outsourced encrypted data. In: 33rd Annual IEEE International Conference on Computer Communications. IEEE, pp 522–530
Zhou Y, Xu G, Wang Y et al (2016) Chaotic map-based time-aware multi-keyword search scheme with designated server. Wirel Commun Mob Comput 16(3):1851–1858
Acknowledgments
We would like to thank the anonymous referees for their helpful comments. This work is supported by the National Natural Science Foundation of China (grant nos. 61272542, 61672207), the Fundamental Research Funds for the Central Universities (grant no. 2016B10114), the Natural Science Foundation of Jiangsu Province (grant no. BK20161511), a Project Funded by the Priority Academic Program Development of Jiangsu Higher Education Institutions and Jiangsu Collaborative Innovation Center on Atmospheric Environment and Equipment Technology.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Lu, Y., Wang, G., Li, J. et al. Efficient designated server identity-based encryption with conjunctive keyword search. Ann. Telecommun. 72, 359–370 (2017). https://doi.org/10.1007/s12243-017-0574-7
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s12243-017-0574-7