Searchable encryption with randomized ciphertext and randomized keyword search

被引:0
|
作者
Calderini, Marco [1 ]
Longo, Riccardo [1 ,2 ]
Sala, Massimiliano [1 ]
Villa, Irene [1 ,3 ]
机构
[1] Univ Trento, Dept Math, Via Sommar 14, I-38123 Povo, Trento, Italy
[2] Fdn Bruno Kessler, Ctr Cybersecur, Via Sommar 18, I-38123 Povo, Trento, Italy
[3] Univ Genoa, Dept Math, Excellence Dept 2023 2027, Via Dodecaneso 35, I-16146 Genoa, Italy
关键词
searchable encryption; PAEKS scheme; cloud cryptography; bilinear pairings; PUBLIC-KEY ENCRYPTION; GUESSING ATTACKS; AUTHENTICATED ENCRYPTION; SCHEMES; SECURE;
D O I
10.1515/jmc-2023-0029
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The notion of public-key encryption with keyword search (PEKS) was introduced to search over encrypted data without performing any decryption. In this article, we propose a PEKS scheme in which both the encrypted keyword and the trapdoor are randomized so that the cloud server is not able to recognize identical queries a priori. Our scheme is Ciphertext-Indistinguishabiltity secure in the single-user setting and Trapdoor-Indistinguishability secure in the multi-user setting with a stronger security, i.e., with multi-trapdoor.
引用
收藏
页数:14
相关论文
共 50 条
  • [21] A secure index resisting keyword privacy leakage from access and search patterns in searchable encryption
    Li, Yanping
    Cao, Qiang
    Zhang, Kai
    Ren, Fang
    JOURNAL OF SYSTEMS ARCHITECTURE, 2021, 115
  • [22] Fuzzy Keyword Searchable Encryption Scheme Based on Blockchain
    Jiang, Yongbo
    Lu, Juncheng
    Feng, Tao
    INFORMATION, 2022, 13 (11)
  • [23] Secure-Channel Free Certificateless Searchable Public Key Authenticated Encryption with Keyword Search
    Yang, Pan
    Li, Hongbo
    Huang, Jianye
    Zhang, Hao
    Au, Man Ho
    Huang, Qiong
    PROVABLE AND PRACTICAL SECURITY, PROVSEC 2022, 2022, 13600 : 20 - 35
  • [24] KeySea: Keyword-Based Search With Receiver Anonymity in Attribute-Based Searchable Encryption
    Chaudhari, Payal
    Das, Manik Lal
    IEEE TRANSACTIONS ON SERVICES COMPUTING, 2022, 15 (02) : 1036 - 1044
  • [25] Delegate Searchable Encryption Scheme Resisting Keyword Guess
    Cao Suzhen
    Lang Xiaoli
    Liu Xiangzhen
    Zhang Yulei
    Wang Fei
    JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY, 2019, 41 (09) : 2180 - 2186
  • [26] Forward Secure Conjunctive-Keyword Searchable Encryption
    Hu, Chengyu
    Song, Xiangfu
    Liu, Pengtao
    Xin, Yue
    Xu, Yuqin
    Duan, Yuyu
    Hao, Rong
    IEEE ACCESS, 2019, 7 : 35035 - 35048
  • [27] Multi-Value-Independent Ciphertext-Policy Attribute Based Encryption with Fast Keyword Search
    Wang, Haijiang
    Dong, Xiaolei
    Cao, Zhenfu
    IEEE TRANSACTIONS ON SERVICES COMPUTING, 2020, 13 (06) : 1142 - 1151
  • [28] Verifiable Conjunctive Keyword Search with Certificateless Searchable
    Zhang, LingHan
    Jiang, F.
    Tang, Xiaohu
    2021 IEEE 20TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2021), 2021, : 9 - 16
  • [29] Searchable Symmetric Encryption for Restricted Search
    Horvath, Mate
    Vajda, Istvan
    JOURNAL OF COMMUNICATIONS SOFTWARE AND SYSTEMS, 2018, 14 (01) : 104 - 111
  • [30] Searchable Encryption Scheme Supporting Policy Hiding and Constant Ciphertext Length
    Yang Xiaodong
    Li Ting
    Ma Tingchun
    Chen Guilan
    Wang Caifen
    JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY, 2021, 43 (04) : 900 - 907