Comments on a chaos-based public key encryption with keyword search scheme

Recently, Li et al. employed chaotic maps to propose a public key encryption with keyword search scheme. The authors claimed that their scheme provides security against keyword guessing attack (KGA) performed by inside and outside adversaries. The goal of this paper is to show that this claim is not true about inside attackers. We prove that it is possible for an inside adversary to launch an attack even more severe than KGA and obtain the corresponding keyword to any searchable ciphertext. We further propose a simple fix to overcome the proposed attack.

[1]  Yehuda Lindell,et al.  Introduction to Modern Cryptography , 2004 .

[2]  M. Baptista Cryptography with chaos , 1998 .

[3]  Mahdi Nouri,et al.  The Parallel One-way Hash Function Based on Chebyshev-Halley Methods with Variable Parameter , 2014, Int. J. Comput. Commun. Control.

[4]  Debiao He,et al.  An efficient chaos‐based 2‐party key agreement protocol with provable security , 2017, Int. J. Commun. Syst..

[5]  L. Kocarev Chaos-based cryptography: a brief overview , 2001 .

[6]  Dawn Xiaodong Song,et al.  Practical techniques for searches on encrypted data , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.

[7]  Cheng-Chi Lee,et al.  An extended chaotic maps-based key agreement protocol with user anonymity , 2011, Nonlinear Dynamics.

[8]  Rafail Ostrovsky,et al.  Searchable symmetric encryption: improved definitions and efficient constructions , 2006, CCS '06.

[9]  Xiaofeng Liao,et al.  A novel key agreement protocol based on chaotic maps , 2007, Inf. Sci..

[10]  Peng Gong,et al.  Cryptanalysis and improvement of a three-party key agreement protocol using enhanced Chebyshev polynomials , 2013, Nonlinear Dynamics.

[11]  Linhua Zhang Cryptanalysis of the public key encryption based on multiple chaotic systems , 2008 .

[12]  Mario Marchese,et al.  Statistical fingerprint‐based intrusion detection system (SF‐IDS) , 2017, Int. J. Commun. Syst..

[13]  Ljupco Kocarev,et al.  Public-key encryption with chaos. , 2004, Chaos.

[14]  Liehuang Zhu,et al.  Search pattern leakage in searchable encryption: Attacks and new construction , 2014, Inf. Sci..

[15]  Chun-Ta Li,et al.  An extended chaotic maps-based keyword search scheme over encrypted data resist outside and inside keyword guessing attacks in cloud storage services , 2015 .

[16]  King-Hang Wang,et al.  Comments on “An improved secure and efficient password and chaos-based two-party key agreement protocol” , 2016, Nonlinear Dynamics.

[17]  Bok-Min Goi,et al.  Off-Line Keyword Guessing Attacks on Recent Public Key Encryption with Keyword Search Schemes , 2008, ATC.

[18]  Zhihua Zhang,et al.  C2MP: Chebyshev chaotic map-based authentication protocol for RFID applications , 2015, Personal and Ubiquitous Computing.

[19]  Dong Hoon Lee,et al.  Off-Line Keyword Guessing Attacks on Recent Keyword Search Schemes over Encrypted Data , 2006, Secure Data Management.

[20]  Rafail Ostrovsky,et al.  Public Key Encryption with Keyword Search , 2004, EUROCRYPT.

[21]  Yehuda Lindell,et al.  Introduction to Modern Cryptography (Chapman & Hall/Crc Cryptography and Network Security Series) , 2007 .