Anonymous Searchable Encryption Scheme for Multi-User Databases

被引:2
|
作者
Varadharajan, Vijayaraghavan [1 ]
Mani, Raghubansh [1 ]
Nallusamy, Rajarathnam [1 ]
机构
[1] Infosys Ltd, Infosys Labs, Convergence Lab, Bangalore 560100, Karnataka, India
关键词
Searchable Encryption; Discrete Log Problem; Multi-user; Proxy Encryption; PRIVATE INFORMATION-RETRIEVAL;
D O I
10.1109/IC2E.2013.30
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
With the ever advancing technology of fast information processing, protecting data with only access control mechanisms is becoming increasingly difficult. If someone breaks into a database, the entire data will be compromised if it is in plaintext form. One quick remedy is to keep the data in encrypted form. However, encryption will make it difficult to do any operations on the data. This has prompted considerable research in the last decade and has led to various schemes of searchable encryption. It allows search over the encrypted data. There are various techniques which support different levels of querying, making it suitable for variety of applications. However, almost all of them are either symmetric-key or single-user schemes or require key sharing. Here, we are proposing a new scheme which will allow multiple users to encrypt, store and decrypt their own data, along with support for doing data searches over all the data by other users.
引用
收藏
页码:225 / 232
页数:8
相关论文
共 50 条
  • [1] Revocable and anonymous searchable encryption in multi-user setting
    Miao, Yinbin
    Ma, Jianfeng
    Liu, Zhiquan
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2016, 28 (04): : 1204 - 1218
  • [2] A discretionary searchable encryption scheme in multi-user settings
    Li, Zhen
    Jiang, Han
    Zhao, Minghao
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2015, 52 (10): : 2313 - 2322
  • [3] Certificateless Searchable Encryption Scheme in Multi-User Environment
    Feng, Tao
    Si, Jiewen
    CRYPTOGRAPHY, 2022, 6 (04)
  • [4] Certificateless Authentication Searchable Encryption Scheme for Multi-user
    Zhang Yulei
    Wen Long
    Wang Haohao
    Zhang Yongjie
    Wang Caifen
    JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY, 2020, 42 (05) : 1094 - 1101
  • [5] Blockchain searchable encryption scheme for multi-user environment
    Zhai, Sheping
    Zhang, Ruiting
    Yang, Rui
    Cao, Yongqiang
    Xi'an Dianzi Keji Daxue Xuebao/Journal of Xidian University, 2024, 51 (04): : 151 - 169
  • [6] Multi-user and Keyword-based Searchable Encryption Scheme
    Zhang, Ya-ling
    Liu, Li-jun
    Wang, Shang-ping
    PROCEEDINGS OF 2016 12TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS), 2016, : 223 - 227
  • [7] Multi-user Searchable Encryption in the Cloud
    Van Rompay, Cedric
    Molva, Refik
    Oenen, Melek
    INFORMATION SECURITY, ISC 2015, 2015, 9290 : 299 - 316
  • [8] An Efficient Scheme of Multi-user Searchable Encryption with Keyword in Cloud Storage
    He, Zhiling
    Wang, Baomin
    Luo, Wenjun
    PROCEEDINGS OF THE 1ST INTERNATIONAL WORKSHOP ON CLOUD COMPUTING AND INFORMATION SECURITY (CCIS 2013), 2013, 52 : 144 - 147
  • [9] A multi-user searchable encryption scheme with keyword authorization in a cloud storage
    Deng, Zuojie
    Li, Kenli
    Li, Keqin
    Zhou, Jingli
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2017, 72 : 208 - 218
  • [10] IDCrypt: A Multi-User Searchable Symmetric Encryption Scheme for Cloud Applications
    Wang, Guofeng
    Liu, Chuanyi
    Dong, Yingfei
    Han, Peiyi
    Pan, Hezhong
    Fang, Binxing
    IEEE ACCESS, 2018, 6 : 2908 - 2921