Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

Constructing PEKS schemes secure against keyword guessing attacks is possible?

Full metadata record
DC Field Value Language
dc.contributor.authorJeong, I.R.-
dc.contributor.authorKwon, J.O.-
dc.contributor.authorHong, D.-
dc.contributor.authorLee, D.H.-
dc.date.accessioned2021-09-09T00:14:37Z-
dc.date.available2021-09-09T00:14:37Z-
dc.date.created2021-06-17-
dc.date.issued2009-
dc.identifier.issn0140-3664-
dc.identifier.urihttps://scholar.korea.ac.kr/handle/2021.sw.korea/121856-
dc.description.abstractByun et al. suggested keyword guessing attacks and showed that some PEKS (public-key encryption with keyword search) schemes are not secure to keyword guessing attacks, when the number of possible keywords is bounded by some polynomial. Abdalla et al. showed that robust PEKS schemes should satisfy consistency which ensures the PEKS schemes fulfil their functions. In the paper, we show a negative result about the open problem to construct secure PEKS schemes against keyword guessing attacks. Our result shows that consistency implies insecurity to keyword guessing attacks in PEKS. This means that constructing secure and consistent PEKS schemes against keyword guessing attacks is impossible, when the number of possible keywords is bounded by some polynomial. © 2008 Elsevier B.V. All rights reserved.-
dc.languageEnglish-
dc.language.isoen-
dc.subjectOnline searching-
dc.subjectPolynomial approximation-
dc.subjectConsistency-
dc.subjectKeyword guessing attack-
dc.subjectKeyword search-
dc.subjectOpen problems-
dc.subjectSearchable encryption-
dc.subjectCryptography-
dc.titleConstructing PEKS schemes secure against keyword guessing attacks is possible?-
dc.typeArticle-
dc.contributor.affiliatedAuthorJeong, I.R.-
dc.contributor.affiliatedAuthorLee, D.H.-
dc.identifier.doi10.1016/j.comcom.2008.11.018-
dc.identifier.scopusid2-s2.0-58249100325-
dc.identifier.bibliographicCitationComputer Communications, v.32, no.2, pp.394 - 396-
dc.relation.isPartOfComputer Communications-
dc.citation.titleComputer Communications-
dc.citation.volume32-
dc.citation.number2-
dc.citation.startPage394-
dc.citation.endPage396-
dc.type.rimsART-
dc.type.docTypeArticle-
dc.description.journalClass1-
dc.description.journalRegisteredClassscopus-
dc.subject.keywordPlusOnline searching-
dc.subject.keywordPlusPolynomial approximation-
dc.subject.keywordPlusConsistency-
dc.subject.keywordPlusKeyword guessing attack-
dc.subject.keywordPlusKeyword search-
dc.subject.keywordPlusOpen problems-
dc.subject.keywordPlusSearchable encryption-
dc.subject.keywordPlusCryptography-
dc.subject.keywordAuthorConsistency-
dc.subject.keywordAuthorKeyword guessing attack-
dc.subject.keywordAuthorKeyword search-
dc.subject.keywordAuthorSearchable encryption-
Files in This Item
There are no files associated with this item.
Appears in
Collections
School of Cyber Security > Department of Information Security > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher Jeong, Ik Rae photo

Jeong, Ik Rae
정보보호학과
Read more

Altmetrics

Total Views & Downloads

BROWSE