Oblivious conjunctive keyword search

被引:0
|
作者
Rhee, HS [1 ]
Byun, JW [1 ]
Lee, DH [1 ]
Lim, J [1 ]
机构
[1] Korea Univ, CIST, Seoul, South Korea
来源
关键词
conjunctive keyword search; storage system; oblivious transfer; anonymity; privacy;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
We study the problem of keyword search in which a server contains various multimedia contents and a user of server wishes to retrieve some multimedia item containing specific keywords without revealing to the server which item it is. Recently, Ogata and Kurosawa introduced an interesting keyword search scheme called oblivious keyword search by using the notion of oblivious transfer. However, only one keyword can be searched in each query, hence the scheme cannot provide a conjunctive keyword search which finds items containing each of several keywords. In this paper, we firstly design a conjunctive keyword search by using the oblivious transfer, and present oblivious conjunctive keyword search (for short, OCKS). We prove that OCKS protocol is secure under the intractability of RSA known target inversion problem.
引用
收藏
页码:318 / 327
页数:10
相关论文
共 50 条
  • [1] Oblivious keyword search
    Ogata, W
    Kurosawa, K
    [J]. JOURNAL OF COMPLEXITY, 2004, 20 (2-3) : 356 - 371
  • [2] Oblivious Keyword Search with Authorization
    Jiang, Peng
    Wang, Xiaofen
    Lai, Jianchang
    Guo, Fuchun
    Chen, Rongmao
    [J]. PROVABLE SECURITY, (PROVSEC 2016), 2016, 10005 : 173 - 190
  • [3] Keyword search and oblivious pseudorandom functions
    Freedman, IJ
    Ishai, Y
    Pinkas, B
    Reingold, O
    [J]. THEORY OF CRYPTOGRAPHY, PROCEEDINGS, 2005, 3378 : 303 - 324
  • [4] Verifiable Conjunctive Keyword Search with Certificateless Searchable
    Zhang, LingHan
    Jiang, F.
    Tang, Xiaohu
    [J]. 2021 IEEE 20TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2021), 2021, : 9 - 16
  • [5] Research on oblivious keyword search protocols with CKA security
    Jiang, ZhengTao
    Liu, Ling
    Pang, LiaoJun
    [J]. INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2018, 31 (15)
  • [6] Difference set attacks on conjunctive keyword search schemes
    Rhee, Hyun Sook
    Jeong, Ik Rae
    Byun, Jin Wook
    Lee, Dong Hoon
    [J]. SECURE DATA MANAGEMENT, 2006, 4165 : 64 - 74
  • [7] Oblivious keyword search protocols in the public database model
    Zhu, Huafei
    Bao, Feng
    [J]. 2007 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-14, 2007, : 1336 - 1341
  • [8] Public key encryption with conjunctive field keyword search
    Park, DJ
    Kim, K
    Lee, PJ
    [J]. INFORMATION SECURITY APPLICATIONS, 2005, 3325 : 73 - 86
  • [9] Symmetric Searchable Encryption with Efficient Conjunctive Keyword Search
    Jho, Nam-Su
    Hong, Dowon
    [J]. KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2013, 7 (05): : 1328 - 1342
  • [10] Public key encryption with conjunctive keyword search on lattice
    Wang, Peng
    Xiang, Tao
    Li, Xiaoguo
    Xiang, Hong
    [J]. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2020, 51