Efficient public key encryption with revocable keyword search

被引:28
|
作者
Yu, Yong [1 ,2 ]
Ni, Jianbing [1 ]
Yang, Haomiao [1 ]
Mu, Yi [2 ]
Susilo, Willy [2 ]
机构
[1] Univ Elect Sci & Technol China, Sch Comp Sci & Engn, Chengdu 611731, Peoples R China
[2] Univ Wollongong, Sch Comp Sci & Software Engn, Ctr Comp & Informat Secur Res, Wollongong, NSW 2522, Australia
基金
中国国家自然科学基金; 新加坡国家研究基金会;
关键词
cloud computing; public key encryption; keyword search; provably security; cryptographic primitive; GUESSING ATTACKS; SECURE; SCHEMES;
D O I
10.1002/sec.790
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Public key encryption with keyword search is a novel cryptographic primitive enabling one to search on the encrypted data directly. In the known schemes, once getting a trapdoor, the server can search associated data without any restrictions. However, in reality, it is sometimes essential to prevent the server from searching the data all the time because the server is not fully trusted. In this paper, we propose the notion of public key encryption with revocable keyword search to address the issue. We also develop a concrete construction by dividing the whole life of the system into distinct times to achieve our goals. The proposed scheme achieves the properties of the indistinguishability of ciphertexts against an adaptive chosen keywords attack security under the co-decisional bilinear Diffie-Hellman assumption in our security model. Compared with two somewhat schemes, ours offers much better performance in terms of computational cost. Copyright (c) 2013 John Wiley & Sons, Ltd.
引用
收藏
页码:466 / 472
页数:7
相关论文
共 50 条
  • [1] Efficient public key encryption with revocable keyword search in cloud computing
    Jianhong Zhang
    Jian Mao
    [J]. Cluster Computing, 2016, 19 : 1211 - 1217
  • [2] Efficient public key encryption with revocable keyword search in cloud computing
    Zhang, Jianhong
    Mao, Jian
    [J]. CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2016, 19 (03): : 1211 - 1217
  • [3] Revocable Public Key Encryption with Authorized Keyword Search
    Xu, Wujing
    Dong, Xiaolei
    Cao, Zhenfu
    Shen, Jiachen
    [J]. PROCEEDINGS OF 2019 IEEE 3RD INFORMATION TECHNOLOGY, NETWORKING, ELECTRONIC AND AUTOMATION CONTROL CONFERENCE (ITNEC 2019), 2019, : 857 - 860
  • [4] Public key encryption with keyword search
    Boneh, D
    Di Crescenzo, G
    Ostrovsky, R
    Persiano, G
    [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2004, PROCEEDINGS, 2004, 3027 : 506 - 522
  • [5] Combining Public Key Encryption with Keyword Search and Public Key Encryption
    Zhang, Rui
    Imai, Hideki
    [J]. IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2009, E92D (05) : 888 - 896
  • [6] Generic combination of public key encryption with keyword search and public key encryption
    Zhang, Rui
    Imai, Hideki
    [J]. CRYPTOLOGY AND NETWORK SECURITY, 2007, 4856 : 159 - 174
  • [7] On the integration of public key data encryption and public key encryption with keyword search
    Baek, Joonsang
    Safavi-Naini, Reihaneh
    Susilo, Willy
    [J]. INFORMATION SECURITY, PROCEEDINGS, 2006, 4176 : 217 - 232
  • [8] Efficient public key encryption with keyword search schemes from pairings
    Gu, Chunxiang
    Zhu, Yuefei
    Pan, Heng
    [J]. INFORMATION SECURITY AND CRYPTOLOGY, 2008, 4990 : 372 - +
  • [9] The Public Verifiability of Public Key Encryption with Keyword Search
    Zhu, Binrui
    Sun, Jiameng
    Qin, Jing
    Ma, Jixin
    [J]. MOBILE NETWORKS AND MANAGEMENT (MONAMI 2017), 2018, 235 : 299 - 312
  • [10] Public key encryption with keyword search revisited
    Baek, Joonsang
    Safavi-Naini, Reihaneh
    Susilo, Willy
    [J]. COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2008, PT 1, PROCEEDINGS, 2008, 5072 : 1249 - 1259