Anonymous Searchable Encryption Scheme for Multi-User Databases

被引:2
|
作者
Varadharajan, Vijayaraghavan [1 ]
Mani, Raghubansh [1 ]
Nallusamy, Rajarathnam [1 ]
机构
[1] Infosys Ltd, Infosys Labs, Convergence Lab, Bangalore 560100, Karnataka, India
关键词
Searchable Encryption; Discrete Log Problem; Multi-user; Proxy Encryption; PRIVATE INFORMATION-RETRIEVAL;
D O I
10.1109/IC2E.2013.30
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
With the ever advancing technology of fast information processing, protecting data with only access control mechanisms is becoming increasingly difficult. If someone breaks into a database, the entire data will be compromised if it is in plaintext form. One quick remedy is to keep the data in encrypted form. However, encryption will make it difficult to do any operations on the data. This has prompted considerable research in the last decade and has led to various schemes of searchable encryption. It allows search over the encrypted data. There are various techniques which support different levels of querying, making it suitable for variety of applications. However, almost all of them are either symmetric-key or single-user schemes or require key sharing. Here, we are proposing a new scheme which will allow multiple users to encrypt, store and decrypt their own data, along with support for doing data searches over all the data by other users.
引用
收藏
页码:225 / 232
页数:8
相关论文
共 50 条
  • [1] Revocable and anonymous searchable encryption in multi-user setting
    Miao, Yinbin
    Ma, Jianfeng
    Liu, Zhiquan
    [J]. CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2016, 28 (04): : 1204 - 1218
  • [2] A discretionary searchable encryption scheme in multi-user settings
    Li, Zhen
    Jiang, Han
    Zhao, Minghao
    [J]. Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2015, 52 (10): : 2313 - 2322
  • [3] Certificateless Searchable Encryption Scheme in Multi-User Environment
    Feng, Tao
    Si, Jiewen
    [J]. CRYPTOGRAPHY, 2022, 6 (04)
  • [4] Certificateless Authentication Searchable Encryption Scheme for Multi-user
    Zhang Yulei
    Wen Long
    Wang Haohao
    Zhang Yongjie
    Wang Caifen
    [J]. JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY, 2020, 42 (05) : 1094 - 1101
  • [5] Blockchain searchable encryption scheme for multi-user environment
    Zhai, Sheping
    Zhang, Ruiting
    Yang, Rui
    Cao, Yongqiang
    [J]. Xi'an Dianzi Keji Daxue Xuebao/Journal of Xidian University, 2024, 51 (04): : 151 - 169
  • [6] Multi-user and Keyword-based Searchable Encryption Scheme
    Zhang, Ya-ling
    Liu, Li-jun
    Wang, Shang-ping
    [J]. PROCEEDINGS OF 2016 12TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS), 2016, : 223 - 227
  • [7] Multi-user Searchable Encryption in the Cloud
    Van Rompay, Cedric
    Molva, Refik
    Oenen, Melek
    [J]. INFORMATION SECURITY, ISC 2015, 2015, 9290 : 299 - 316
  • [8] A multi-user searchable encryption scheme with keyword authorization in a cloud storage
    Deng, Zuojie
    Li, Kenli
    Li, Keqin
    Zhou, Jingli
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2017, 72 : 208 - 218
  • [9] An Efficient Scheme of Multi-user Searchable Encryption with Keyword in Cloud Storage
    He, Zhiling
    Wang, Baomin
    Luo, Wenjun
    [J]. PROCEEDINGS OF THE 1ST INTERNATIONAL WORKSHOP ON CLOUD COMPUTING AND INFORMATION SECURITY (CCIS 2013), 2013, 52 : 144 - 147
  • [10] IDCrypt: A Multi-User Searchable Symmetric Encryption Scheme for Cloud Applications
    Wang, Guofeng
    Liu, Chuanyi
    Dong, Yingfei
    Han, Peiyi
    Pan, Hezhong
    Fang, Binxing
    [J]. IEEE ACCESS, 2018, 6 : 2908 - 2921