A Study of Public Key Encryption with Keyword Search

Public Key Encryption with Keyword Search (PEKS) scheme enable one to search the encrypted data with a keyword without revealing any information. The concept of a PEKS scheme was proposed by Boneh et al. in 2004 and Baek et al. who extended PEKS scheme into a secure channel free PEKS scheme (SCF-PEKS) which removes the assumption, a secure channel between users and a server. In this paper, we show an overview of six existing security models of PEKS/SCF-PEKS scheme and conclude flve security requirements that must satisfy to construct a secure PEKS/SCF-PEKS scheme. Then we compare the security and e‐ciency of the security models and discuss the future researches of PEKS/SCF-PEKS.

[1]  Kaoru Kurosawa,et al.  k-Resilient Identity-Based Encryption in the Standard Model , 2004, CT-RSA.

[2]  Willy Susilo,et al.  A Secure Channel Free Public Key Encryption with Keyword Search Scheme without Random Oracle , 2009, CANS.

[3]  Pil Joong Lee,et al.  Public Key Encryption with Conjunctive Keyword Search and Its Extension to a Multi-user System , 2007, Pairing.

[4]  Pieter H. Hartel,et al.  Public-Key Encryption with Delegated Search , 2011, ACNS.

[5]  Rafail Ostrovsky,et al.  Public Key Encryption with Keyword Search , 2004, EUROCRYPT.

[6]  Joonsang Baek,et al.  Public Key Encryption with Keyword Search Revisited , 2008, ICCSA.

[7]  Dong Hoon Lee,et al.  Trapdoor security in a searchable public-key encryption scheme with a designated tester , 2010, J. Syst. Softw..

[8]  Qiang Tang,et al.  A New Trapdoor-indistinguishable Public Key Encryption with Keyword Search , 2012, J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl..

[9]  Dalia Khader,et al.  Public Key Encryption with Keyword Search Based on K-Resilient IBE , 2006, ICCSA.

[10]  Yuefei Zhu,et al.  New Efficient Searchable Encryption Schemes from Bilinear Pairings , 2010, Int. J. Netw. Secur..

[11]  Chengyu Hu,et al.  A Secure Searchable Public Key Encryption Scheme with a Designated Tester against Keyword Guessing Attacks and Its Extension , 2011, CSEE.

[12]  Dawn Xiaodong Song,et al.  Practical techniques for searches on encrypted data , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.

[13]  Kihyun Kim,et al.  Public Key Encryption with Conjunctive Field Keyword Search , 2004, WISA.

[14]  Matthew K. Franklin,et al.  Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.

[15]  Dong Hoon Lee,et al.  Constructing PEKS schemes secure against keyword guessing attacks is possible? , 2009, Comput. Commun..

[16]  Qiang Tang,et al.  Extend the Concept of Public Key Encryption with Delegated Search , 2015, Comput. J..

[17]  Qiang Tang,et al.  Refine the Concept of Public Key Encryption with Delegated Search , 2012, IACR Cryptol. ePrint Arch..

[18]  Willy Susilo,et al.  Secure searchable public key encryption scheme against keyword guessing attacks , 2009, IEICE Electron. Express.

[19]  Bok-Min Goi,et al.  Off-Line Keyword Guessing Attacks on Recent Public Key Encryption with Keyword Search Schemes , 2008, ATC.

[20]  Jie Wu,et al.  An Efficient Privacy Preserving Keyword Search Scheme in Cloud Computing , 2009, 2009 International Conference on Computational Science and Engineering.

[21]  Chun-Xiang Xu,et al.  An Efficient Public Key Encryption with Keyword Scheme Not Using Pairing , 2011, 2011 First International Conference on Instrumentation, Measurement, Computer, Communication and Control.

[22]  Brent Waters,et al.  Secure Conjunctive Keyword Search over Encrypted Data , 2004, ACNS.

[23]  Dong Hoon Lee,et al.  Improved searchable public key encryption with designated tester , 2009, ASIACCS '09.

[24]  Ran Canetti,et al.  The random oracle methodology, revisited , 2000, JACM.

[25]  Dong Hoon Lee,et al.  Off-Line Keyword Guessing Attacks on Recent Keyword Search Schemes over Encrypted Data , 2006, Secure Data Management.