Cryptology ePrint Archive: Report 2020/1530

Security Analysis of Public Key Searchable Encryption Schemes against Injection Attacks

Arian Arabnouri and Reza Ebrahimi Atani and Shiva Azizzadeh

Abstract: Cloud computing and cloud storage are among the most efficient technologies for storing and processing metadata. But there are many privacy concerns within this domain. Most of the challenges are coming from trusted or semi trusted cloud servers where some computations must be applied to high confidential data. Data encryption can solve some confidentiality issues on the cloud but it is not easy to provide privacy preserving data processing services such as searching a query over encrypted data. On the other hand implementing searchable encryption algorithms in cloud infrastructure helps providing data confidentiality and privacy preserving data processing and can provide searching capability as well, which is the most important step of selecting a document. First in this article, some injection attacks against searchable public key encryption schemes are described. To be more specific message injection attack and index injection attack are applied against PEKS and PERKS schemes. Afterwards, two new schemes are proposed that are secure against them and are based of dPEKS and SAE-I. Finally, efficiency and security of proposed schemes are analyzed, and some implementation issues were discussed.

Category / Keywords: public-key cryptography / searchable encryption

Date: received 7 Dec 2020

Contact author: reza ebrahimi atani at gmail com

Available format(s): PDF | BibTeX Citation

Version: 20201208:124855 (All versions of this report)

Short URL: ia.cr/2020/1530


[ Cryptology ePrint archive ]