On the security of a certificateless public key encryption with keyword search

Tsu Yang Wu*, Chao Meng, Chien Ming Chen, King Hang Wang, Jeng Shyang Pan

*Corresponding author for this work

Research output: Chapter in Book/Conference Proceeding/ReportConference Paper published in a bookpeer-review

Abstract

Public key encryption with keyword search (PEKS) is one of searchable encryption mechanisms. It not only provides user to retrieve ciphertext by keyword but also protects the confidentiality of keyword. In the past, many PEKS schemes based on different cryptosystems were proposed. Recently. Zheng et al. proposed a certificateless based PEKS scheme called CLKS. In this paper, we show that Zheng et al.’s CLKS scheme has some security flaw, i.e. their scheme suffered from an off-line keyword guessing attack.

Original languageEnglish
Title of host publicationAdvances in Intelligent Information Hiding and Multimedia Signal Processing - Proceedings of the 13th International Conference on Intelligent Information Hiding and Multimedia Signal Processing,
EditorsJeng-Shyang Pan, Pei-Wei Tsai, Lakhmi C. Jain, Junzo Watada
PublisherSpringer Science and Business Media Deutschland GmbH
Pages191-197
Number of pages7
ISBN (Print)9783319638553
DOIs
Publication statusPublished - 2018
Externally publishedYes
Event13th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIH-MSP 2017 - Matsue, Shimane, Japan
Duration: 12 Aug 201715 Aug 2017

Publication series

NameSmart Innovation, Systems and Technologies
Volume81
ISSN (Print)2190-3018
ISSN (Electronic)2190-3026

Conference

Conference13th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIH-MSP 2017
Country/TerritoryJapan
CityMatsue, Shimane
Period12/08/1715/08/17

Bibliographical note

Publisher Copyright:
© Springer International Publishing AG 2018.

Keywords

  • Certificateless
  • Cryptanalysis
  • Off-line guessing attack
  • Public key encryption with search

Fingerprint

Dive into the research topics of 'On the security of a certificateless public key encryption with keyword search'. Together they form a unique fingerprint.

Cite this