ABSTRACT
Different from the traditional public key encryption, searchable public key encryption allows a data owner to encrypt his data under a user's public key in such a way that the user can generate search token keys using her secret key and then query an encryption storage server. On receiving such a search token key, the server filters all or related stored encryptions and returns matched ones as response.
Searchable pubic key encryption has many promising applications. Unfortunately, existing schemes either only support simple query predicates, such as equality queries and conjunctive queries, or have a superpolynomial blowup in ciphertext size and search token key size.
In this paper, based on the key-policy attribute-based encryption scheme proposed by Lewko et al. recently, we present a new construction of searchable public key encryption. Compared to previous works in this field, our construction is much more expressive and efficient and is proven secure in the standard model.
- M. Abdalla, M. Bellare, D. Catalano, E. Kiltz, T. Kohno, T. Lange, J. Malone-Lee, G. Neven, P. Paillier, and H. Shi. Searchable encryption revisited: Consistency properties, relation to anonymous ibe, and extensions. In CRYPTO, pages 205--222, 2005. Google ScholarDigital Library
- J. Baek, R. Safavi-Naini, and W. Susilo. On the integration of public key data encryption and public key encryption with keyword search. In ISC, pages 217--232, 2006. Google ScholarDigital Library
- J. Baek, R. Safavi-Naini, and W. Susilo. Public key encryption with keyword search revisited. In ICCSA (1), pages 1249--1259, 2008. Google Scholar
- A. Beimel. Secure Schemes for Secret Sharing and Key Distribution. PhD thesis, Israel Institute of Technology, 1996.Google Scholar
- M. Bellare, A. Boldyreva, and A. O'Neill. Deterministic and efficiently searchable encryption. In CRYPTO, pages 535--552, 2007. Google ScholarDigital Library
- B. H. Bloom. Space/time trade-offs in hash coding with allowable errors. Commun. ACM, 13(7):422--426, 1970. Google ScholarDigital Library
- D. Boneh, G. D. Crescenzo, R. Ostrovsky, and G. Persiano. Public key encryption with keyword search. In EUROCRYPT, pages 506--522, 2004.Google ScholarCross Ref
- D. Boneh, E.-J. Goh, and K. Nissim. Evaluating 2-dnf formulas on ciphertexts. In TCC, pages 325--341, 2005. Google ScholarDigital Library
- D. Boneh, E. Kushilevitz, R. Ostrovsky, and W. E. S. III. Public key encryption that allows pir queries. In CRYPTO, pages 50--67, 2007. Google ScholarDigital Library
- D. Boneh and B. Waters. Conjunctive, subset, and range queries on encrypted data. In TCC, pages 535--554, 2007. Google ScholarDigital Library
- J. Bringer, H. Chabanne, and B. Kindarji. Error-tolerant searchable encryption. In ICC, pages 1--6, 2009. Google ScholarDigital Library
- J. W. Byun, H. S. Rhee, H.-A. Park, and D. H. Lee. Off-line keyword guessing attacks on recent keyword search schemes over encrypted data. In Secure Data Management, pages 75--83, 2006. Google ScholarDigital Library
- G. D. Crescenzo and V. Saraswat. Public key encryption with searchable keywords based on jacobi symbols. In INDOCRYPT, pages 282--296, 2007. Google ScholarDigital Library
- L. Fang, W. Susilo, C. Ge, and J. Wang. A secure channel free public key encryption with keyword search scheme without random oracle. In CANS, pages 248--258, 2009. Google ScholarDigital Library
- T. Fuhr and P. Paillier. Decryptable searchable encryption. In ProvSec, pages 228--236, 2007. Google ScholarDigital Library
- P. Golle, J. Staddon, and B. R. Waters. Secure conjunctive keyword search over encrypted data. In ACNS, pages 31--45, 2004.Google ScholarCross Ref
- V. Goyal, O. Pandey, A. Sahai, and B. Waters. Attribute-based encryption for fine-grained access control of encrypted data. In ACM Conference on Computer and Communications Security, pages 89--98, 2006. Google ScholarDigital Library
- C. Gu, Y. Zhu, and H. Pan. Efficient public key encryption with keyword search schemes from pairings. In Inscrypt, pages 372--383, 2007.Google Scholar
- Y. H. Hwang and P. J. Lee. Public key encryption with conjunctive keyword search and its extension to a multi-user system. In Pairing, pages 2--22, 2007. Google ScholarDigital Library
- J. Katz, A. Sahai, and B. Waters. Predicate encryption supporting disjunctions, polynomial equations, and inner products. IACR Cryptology ePrint Archive, 2007:404, 2007.Google Scholar
- D. Khader. Public key encryption with keyword search based on k-resilient ibe. In ICCSA (3), pages 298--308, 2006. Google Scholar
- A. B. Lewko, T. Okamoto, A. Sahai, K. Takashima, and B. Waters. Fully secure functional encryption: Attribute-based encryption and (hierarchical) inner product encryption. In EUROCRYPT, pages 62--91, 2010. Google ScholarDigital Library
- A. B. Lewko and B. Waters. New techniques for dual system encryption and fully secure hibe with short ciphertexts. In TCC, pages 455--479, 2010. Google ScholarDigital Library
- A. B. Lewko and B. Waters. Decentralizing attribute-based encryption. In EUROCRYPT, pages 568--588, 2011. Google ScholarDigital Library
- A. B. Lewko and B. Waters. New proof methods for attribute-based encryption: Achieving full security through selective techniques. In CRYPTO, pages 180--198, 2012.Google ScholarDigital Library
- D. J. Park, K. Kim, and P. J. Lee. Public key encryption with conjunctive field keyword search. In WISA, pages 73--86, 2004. Google ScholarDigital Library
- H. S. Rhee, J. H. Park, W. Susilo, and D. H. Lee. Improved searchable public key encryption with designated tester. In ASIACCS, pages 376--379, 2009. Google ScholarDigital Library
- H. S. Rhee, J. H. Park, W. Susilo, and D. H. Lee. Trapdoor security in a searchable public-key encryption scheme with a designated tester. Journal of Systems and Software, 83(5):763--771, 2010. Google ScholarDigital Library
- H. S. Rhee, W. Susilo, and H.-J. Kim. Secure searchable public key encryption scheme against keyword guessing attacks. IEICE Electronics Express, 6(5):237--243, 2009.Google ScholarCross Ref
- A. Sahai and B. Waters. Fuzzy identity-based encryption. In EUROCRYPT, pages 457--473, 2005. Google ScholarDigital Library
- E. Shen, E. Shi, and B. Waters. Predicate privacy in encryption systems. In TCC, pages 457--473, 2009. Google ScholarDigital Library
- Q. Tang and L. Chen. Public-key encryption with registered keyword search. In EuroPKI, pages 163--178, 2009. Google ScholarDigital Library
- B. Zhang and F. Zhang. An efficient public key encryption with conjunctive-subset keywords search. J. Network and Computer Applications, 34(1):262--267, 2011. Google ScholarDigital Library
- R. Zhang and H. Imai. Generic combination of public key encryption with keyword search and public key encryption. In CANS, pages 159--174, 2007. Google ScholarDigital Library
Index Terms
- Expressive search on encrypted data
Recommendations
Public key encryption with keyword search secure against keyword guessing attacks without random oracle
The notion of public key encryption with keyword search (PEKS) was put forth by Boneh et al. to enable a server to search from a collection of encrypted emails given a ''trapdoor'' (i.e., an encrypted keyword) provided by the receiver. The nice property ...
Blind and Anonymous Identity-Based Encryption and Authorised Private Searches on Public Key Encrypted Data
Irvine: Proceedings of the 12th International Conference on Practice and Theory in Public Key Cryptography: PKC '09Searchable encryption schemes provide an important mechanism to cryptographically protect data while keeping it available to be searched and accessed. In a common approach for their construction, the encrypting entity chooses one or several keywords ...
A lattice-based designated-server public-key authenticated encryption with keyword search
AbstractPublic-key Encryption with Keyword Search (PEKS) provides an efficient way to search on encrypted cloud data. However, it cannot resist against off-line Inside Keyword Guessing Attacks (IKGA). To alleviate this issue, Huang and Li proposed the ...
Comments