VR-PEKS: A Verifiable and Resistant to Keyword Guess Attack Public Key Encryption with Keyword Search Scheme
Abstract
:1. Introduction
- We propose a new PEKS scheme based on FHE, called VR-PEKS, and make the scheme resistant to keyword guessing attacks by internal and external adversaries by using the oblivious pseudorandom function (OPRF) to blind keywords. The OPRF keys are securely stored and used by data owners and data users, so that malicious cloud servers cannot generate a valid keyword trapdoor for algorithm.
- We design an encrypted authentication index structure, which is created and disclosed by the data owner, so that the data user can verify the correctness and integrity of the search results, so as to prevent the malicious cloud server from forging, tampering with, or discarding the stored cloud data, or performing the search task incorrectly.
- In the random prediction model, we prove that our scheme satisfies keyword ciphertext indiscriminability and keyword trapdoor indiscriminability under an adaptive keyword selection attack, and compare the security of the scheme with that of other PEKS schemes.
2. Related Work
3. Preliminaries
3.1. Searchable Encryption
3.2. BFV
3.3. Oblivious Pseudorandom Function
3.4. FHE-Based Secure Search
4. VR-PEKS Scheme and Security Definition
4.1. System Model
4.2. Scheme Definition
4.3. Security Model
4.3.1. KC-IND-CKA Security
4.3.2. KT-IND-CKA Security
5. The Proposed VR-PEKS Scheme
5.1. Construction of the Scheme
5.2. Correctness
5.3. Security
6. Comparison
6.1. Security Comparison
6.2. Calculation Comparison
7. Conclusions
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Acknowledgments
Conflicts of Interest
References
- Chen, Y.; Sun, J.; Yang, Y.; Li, T.; Niu, X.; Zhou, H. PSSPR: A source location privacy protection scheme based on sector phantom routing in WSNs. Int. J. Intell. Syst. 2022, 37, 1204–1221. [Google Scholar] [CrossRef]
- Luo, Y.; Chen, Y.; Li, T.; Wang, Y.; Yang, Y.; Yu, X. An Entropy-View Secure Multiparty Computation Protocol Based on Semi-Honest Model. J. Organ. End User Comput. 2022, 34, 1–17. [Google Scholar] [CrossRef]
- Song, D.X.; Wagner, D.; Perrig, A. Practical techniques for searches on encrypted data. In Proceedings of the 2000 IEEE Symposium on Security and Privacy, Berkeley, CA, USA, 14–17 May 2000; IEEE: Piscataway, NJ, USA, 2000; pp. 44–55. [Google Scholar]
- Chaudhari, P.; Das, M.L. KeySea: Keyword-Based Search With Receiver Anonymity in Attribute-Based Searchable Encryption. IEEE Trans. Serv. Comput. 2022, 15, 1036–1044. [Google Scholar] [CrossRef]
- Boneh, D.; Di Crescenzo, G.; Ostrovsky, R.; Persiano, G. Public key encryption with keyword search. In Proceedings of the Advances in Cryptology—EUROCRYPT 2004: International Conference on the Theory and Applications of Cryptographic Techniques, Interlaken, Switzerland, 2–6 May 2004; Springer: Berlin/Heidelberg, Germany, 2004; pp. 506–522. [Google Scholar]
- Andola, N.; Gahlot, R.; Yadav, V.K.; Venkatesan, S.; Verma, S. Searchable encryption on the cloud: A survey. J. Supercomput. 2022, 78, 9952–9984. [Google Scholar] [CrossRef]
- Byun, J.W.; Rhee, H.S.; Park, H.A.; Lee, D.H. Off-line keyword guessing attacks on recent keyword search schemes over encrypted data. In Proceedings of the Secure Data Management: Third VLDB Workshop, SDM 2006, Seoul, Korea, 10–11 September 2006; Springer: Berlin/Heidelberg, Germany, 2006; pp. 75–83. [Google Scholar]
- Xu, P.; Tang, X.; Wang, W.; Jin, H.; Yang, L.T. Fast and parallel keyword search over public-key ciphertexts for cloud-assisted IoT. IEEE Access 2017, 5, 24775–24784. [Google Scholar] [CrossRef]
- Xu, P.; Jin, H.; Wu, Q.; Wang, W. Public-key encryption with fuzzy keyword search: A provably secure scheme under keyword guessing attack. IEEE Trans. Comput. 2012, 62, 2266–2277. [Google Scholar] [CrossRef]
- Rongmao, C.; Yi, M.; Guomin, Y.; Fuchun, G.; Xinyi, H.; Xiaofen, W.; Yongjun, W. Server-Aided Public Key Encryption With Keyword Search. Inf. Forensics Secur. IEEE Trans. ISSN 2016, 11, 1556–6013. [Google Scholar]
- Cheng, L.; Meng, F. Certificateless public key authenticated searchable encryption with enhanced security model in IIoT applications. IEEE Internet Things J. 2022, 10, 1391–1400. [Google Scholar] [CrossRef]
- Baror, S.O.; Venter, H. A taxonomy for cybercrime attack in the public cloud. In Proceedings of the International Conference on Cyber Warfare and Security, Stellenbosch, South Africa, 28 February–1 March 2019; Academic Conferences International Limited: Reading, UK, 2019; p. 505. [Google Scholar]
- Bove, D.; Müller, T. Investigating characteristics of attacks on public cloud systems. In Proceedings of the 2019 6th IEEE International Conference on Cyber Security and Cloud Computing (CSCloud)/2019 5th IEEE International Conference on Edge Computing and Scalable Cloud (EdgeCom), Paris, France, 21–23 June 2019; IEEE: Piscataway, NJ, USA, 2019; pp. 89–94. [Google Scholar]
- Li, T.; Wang, Z.; Chen, Y.; Li, C.; Jia, Y.; Yang, Y. Is semi-selfish mining available without being detected? Int. J. Intell. Syst. 2022, 37, 10576–10597. [Google Scholar] [CrossRef]
- Miao, Y.; Weng, J.; Liu, X.; Choo, K.K.R.; Liu, Z.; Li, H. Enabling verifiable multiple keywords search over encrypted cloud data. Inf. Sci. 2018, 465, 21–37. [Google Scholar] [CrossRef]
- Zhang, Y.; Zhu, T.; Guo, R.; Xu, S.; Cui, H.; Cao, J. Multi-keyword searchable and verifiable attribute-based encryption over cloud data. IEEE Trans. Cloud Comput. 2021, 11, 971–983. [Google Scholar] [CrossRef]
- Yousefipoor, V.; Eghlidos, T. An efficient, secure and verifiable conjunctive keyword search scheme based on rank metric codes over encrypted outsourced cloud data. Comput. Electr. Eng. 2023, 105, 108523. [Google Scholar] [CrossRef]
- Liu, Z.Y.; Tseng, Y.F.; Tso, R.; Mambo, M.; Chen, Y.C. Public-key authenticated encryption with keyword search: A generic construction and its quantum-resistant instantiation. Comput. J. 2022, 65, 2828–2844. [Google Scholar] [CrossRef]
- Gentry, C. Fully homomorphic encryption using ideal lattices. In Proceedings of the Forty-First Annual ACM Symposium on Theory of Computing, Bethesda, MD, USA, 31 May–2 June 2009; pp. 169–178. [Google Scholar]
- Akavia, A.; Feldman, D.; Shaul, H. Secure search on encrypted data via multi-ring sketch. In Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, Toronto, ON, Canada, 15–19 October 2018; pp. 985–1001. [Google Scholar]
- Akavia, A.; Gentry, C.; Halevi, S.; Leibovich, M. Setup-free secure search on encrypted data: Faster and post-processing free. Cryptol. ePrint Arch. 2018. [Google Scholar] [CrossRef] [Green Version]
- Wen, R.; Yu, Y.; Xie, X.; Zhang, Y. Leaf: A faster secure search algorithm via localization, extraction, and reconstruction. In Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, 9–13 November 2020; pp. 1219–1232. [Google Scholar]
- Baek, J.; Safavi-Naini, R.; Susilo, W. Public key encryption with keyword search revisited. In Proceedings of the Computational Science and Its Applications—ICCSA 2008: International Conference, Perugia, Italy, 30 June–3 July 2008; Springer: Berlin/Heidelberg, Germany, 2008; pp. 1249–1259. [Google Scholar]
- Tang, Q.; Chen, L. Public-key encryption with registered keyword search. In Proceedings of the Public Key Infrastructures, Services and Applications: 6th European Workshop, EuroPKI 2009, Pisa, Italy, 10–11 September 2009; Springer: Berlin/Heidelberg, Germany, 2010; pp. 163–178. [Google Scholar]
- Rhee, H.S.; Park, J.H.; Susilo, W.; Lee, D.H. Trapdoor security in a searchable public-key encryption scheme with a designated tester. J. Syst. Softw. 2010, 83, 763–771. [Google Scholar] [CrossRef]
- Li, H.; Huang, Q.; Susilo, W. A secure cloud data sharing protocol for enterprise supporting hierarchical keyword search. IEEE Trans. Dependable Secur. Comput. 2020, 19, 1532–1543. [Google Scholar] [CrossRef]
- Pan, X.; Li, F. Public-key authenticated encryption with keyword search achieving both multi-ciphertext and multi-trapdoor indistinguishability. J. Syst. Archit. 2021, 115, 102075. [Google Scholar] [CrossRef]
- Qin, B.; Cui, H.; Zheng, X.; Zheng, D. Improved security model for public-key authenticated encryption with keyword search. In Proceedings of the Provable and Practical Security: 15th International Conference, ProvSec 2021, Guangzhou, China, 5–8 November 2021; Springer: Berlin/Heidelberg, Germany, 2021; pp. 19–38. [Google Scholar]
- Li, T.; Wang, Z.; Yang, G.; Cui, Y.; Chen, Y.; Yu, X. Semi-selfish mining based on hidden Markov decision process. Int. J. Intell. Syst. 2021, 36, 3596–3612. [Google Scholar] [CrossRef]
- Zheng, Q.; Xu, S.; Ateniese, G. VABKS: Verifiable attribute-based keyword search over outsourced encrypted data. In Proceedings of the IEEE INFOCOM 2014—IEEE Conference on Computer Communications, Toronto, ON, Canada, 27 April–2 May 2014; IEEE: Piscataway, NJ, USA, 2014; pp. 522–530. [Google Scholar]
- Sun, W.; Liu, X.; Lou, W.; Hou, Y.T.; Li, H. Catch you if you lie to me: Efficient verifiable conjunctive keyword search over large dynamic encrypted cloud data. In Proceedings of the 2015 IEEE Conference on Computer Communications (INFOCOM), Hong Kong, China, 26 April–1 May 2015; IEEE: Piscataway, NJ, USA, 2015; pp. 2110–2118. [Google Scholar]
- Chen, Z.; Zhang, F.; Zhang, P.; Liu, J.K.; Huang, J.; Zhao, H.; Shen, J. Verifiable keyword search for secure big data-based mobile healthcare networks with fine-grained authorization control. Future Gener. Comput. Syst. 2018, 87, 712–724. [Google Scholar] [CrossRef]
- Miao, Y.; Tong, Q.; Deng, R.H.; Choo, K.K.R.; Liu, X.; Li, H. Verifiable searchable encryption framework against insider keyword-guessing attack in cloud storage. IEEE Trans. Cloud Comput. 2020, 10, 835–848. [Google Scholar] [CrossRef]
- Fan, J.; Vercauteren, F. Somewhat practical fully homomorphic encryption. Cryptol. ePrint Archive 2012. [Google Scholar]
- Cheon, J.H.; Kim, A.; Kim, M.; Song, Y. Homomorphic encryption for arithmetic of approximate numbers. In Proceedings of the Advances in Cryptology–ASIACRYPT 2017: 23rd International Conference on the Theory and Applications of Cryptology and Information Security, Hong Kong, China, 3–7 December 2017; Springer: Berlin/Heidelberg, Germany, 2017; pp. 409–437. [Google Scholar]
- Freedman, M.J.; Ishai, Y.; Pinkas, B.; Reingold, O. Keyword Search and Oblivious Pseudorandom Functions. In Proceedings of the TCC, Cambridge, MA, USA, 10–12 February 2005; Springer: Berlin/Heidelberg, Germany, 2005; Volume 3378, pp. 303–324. [Google Scholar]
- law Jarecki, S.; Liu, X. Fast secure computation of set intersection. In Proceedings of the International Conference on Security and Cryptography for Networks, Amalfi, Italy, 13–15 September 2010; Springer: Berlin/Heidelberg, Germany, 2010; pp. 418–435. [Google Scholar]
- Regev, O. On lattices, learning with errors, random linear codes, and cryptography. J. ACM 2009, 56, 1–40. [Google Scholar] [CrossRef]
- Maringer, G.; Puchinger, S.; Wachter-Zeh, A. Information- and Coding-Theoretic Analysis of the RLWE/MLWE Channel. IEEE Trans. Inf. Forensics Secur. 2023, 18, 549–564. [Google Scholar] [CrossRef]
- Peikert, C. Lattice cryptography for the internet. In Proceedings of the Post-Quantum Cryptography: 6th International Workshop, PQCrypto 2014, Waterloo, ON, Canada, 1–3 October 2014; Springer: Berlin/Heidelberg, Germany, 2014; pp. 197–219. [Google Scholar]
Schemes | KC-IND | KT-IND | External KGA | Internal KGA | Quantum Attack | Correctness Verifiable | Integrity Verifiable | Third-Party Auditor |
---|---|---|---|---|---|---|---|---|
BDOP-PEKS [5] | yes | no | insecure | insecure | insecure | no | no | / |
VSEF [33] | yes | yes | secure | secure | insecure | yes | no | required |
Zhang’s [16] | yes | yes | secure | secure | insecure | yes | no | required |
Ours | yes | yes | secure | secure | secure | yes | yes | not required |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Tang, Y.; Chen, Y.; Luo, Y.; Dong, S.; Li, T. VR-PEKS: A Verifiable and Resistant to Keyword Guess Attack Public Key Encryption with Keyword Search Scheme. Appl. Sci. 2023, 13, 4166. https://doi.org/10.3390/app13074166
Tang Y, Chen Y, Luo Y, Dong S, Li T. VR-PEKS: A Verifiable and Resistant to Keyword Guess Attack Public Key Encryption with Keyword Search Scheme. Applied Sciences. 2023; 13(7):4166. https://doi.org/10.3390/app13074166
Chicago/Turabian StyleTang, Yingying, Yuling Chen, Yun Luo, Sen Dong, and Tao Li. 2023. "VR-PEKS: A Verifiable and Resistant to Keyword Guess Attack Public Key Encryption with Keyword Search Scheme" Applied Sciences 13, no. 7: 4166. https://doi.org/10.3390/app13074166
APA StyleTang, Y., Chen, Y., Luo, Y., Dong, S., & Li, T. (2023). VR-PEKS: A Verifiable and Resistant to Keyword Guess Attack Public Key Encryption with Keyword Search Scheme. Applied Sciences, 13(7), 4166. https://doi.org/10.3390/app13074166