Anonymous Searchable Encryption Scheme for Multi-User Databases

被引:2
|
作者
Varadharajan, Vijayaraghavan [1 ]
Mani, Raghubansh [1 ]
Nallusamy, Rajarathnam [1 ]
机构
[1] Infosys Ltd, Infosys Labs, Convergence Lab, Bangalore 560100, Karnataka, India
关键词
Searchable Encryption; Discrete Log Problem; Multi-user; Proxy Encryption; PRIVATE INFORMATION-RETRIEVAL;
D O I
10.1109/IC2E.2013.30
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
With the ever advancing technology of fast information processing, protecting data with only access control mechanisms is becoming increasingly difficult. If someone breaks into a database, the entire data will be compromised if it is in plaintext form. One quick remedy is to keep the data in encrypted form. However, encryption will make it difficult to do any operations on the data. This has prompted considerable research in the last decade and has led to various schemes of searchable encryption. It allows search over the encrypted data. There are various techniques which support different levels of querying, making it suitable for variety of applications. However, almost all of them are either symmetric-key or single-user schemes or require key sharing. Here, we are proposing a new scheme which will allow multiple users to encrypt, store and decrypt their own data, along with support for doing data searches over all the data by other users.
引用
收藏
页码:225 / 232
页数:8
相关论文
共 50 条
  • [21] A Multi-User Dynamic Symmetric Searchable Encryption Scheme Supporting Conjunctive Search
    Zhang L.
    Cao W.
    Wang H.
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2022, 59 (10): : 2309 - 2322
  • [22] Probably Secure Multi-user Multi-keyword Searchable Encryption Scheme in Cloud Storage
    Li, Shijin
    Wang, Fucai
    Shi, Ting
    Kuang, Jinyun
    PROCEEDINGS OF 2019 IEEE 3RD INFORMATION TECHNOLOGY, NETWORKING, ELECTRONIC AND AUTOMATION CONTROL CONFERENCE (ITNEC 2019), 2019, : 1368 - 1372
  • [23] A Verifiable Dynamic Multi-user Searchable Encryption Scheme without Trusted Third Parties
    Ye, Fanghan
    Dong, Xiaolei
    Shen, Jiachen
    Cao, Zhenfu
    Zhao, Wenhua
    2019 IEEE 25TH INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED SYSTEMS (ICPADS), 2019, : 896 - 900
  • [24] Efficiently Multi-User Searchable Encryption Scheme with Attribute Revocation and Grant for Cloud Storage
    Wang, Shangping
    Zhang, Xiaoxue
    Zhang, Yaling
    PLOS ONE, 2016, 11 (11):
  • [25] A multi-keyword searchable encryption sensitive data trusted sharing scheme in multi-user scenario
    Wang, Miaomiao
    Rui, Lanlan
    Xu, Siya
    Gao, Zhipeng
    Liu, Huiyong
    Guo, Shaoyong
    COMPUTER NETWORKS, 2023, 237
  • [26] Secure and lightweight multi user searchable encryption scheme
    Andola, Nitish
    Prakash, Sourabh
    Venkatesan, S.
    Verma, Shekhar
    JOURNAL OF INTELLIGENT & FUZZY SYSTEMS, 2018, 35 (02) : 1239 - 1251
  • [27] Multi-user searchable encryption voice in home IoT system
    Li, Wei
    Xiao, Yazhou
    Tang, Chao
    Huang, Xujing
    Xue, Jianwu
    INTERNET OF THINGS, 2020, 11
  • [28] Multi-user Forward Secure Dynamic Searchable Symmetric Encryption
    Wang, Qiao
    Guo, Yu
    Huang, Hejiao
    Jia, Xiaohua
    NETWORK AND SYSTEM SECURITY (NSS 2018), 2018, 11058 : 125 - 140
  • [29] Fine-grained searchable encryption in multi-user setting
    Jun Ye
    Jianfeng Wang
    Jiaolian Zhao
    Jian Shen
    Kuan-Ching Li
    Soft Computing, 2017, 21 : 6201 - 6212
  • [30] Server-aided searchable encryption in multi-user setting
    Sun, Lixue
    Xu, Chunxiang
    Li, Chuang
    Li, Yuhui
    COMPUTER COMMUNICATIONS, 2020, 164 (164) : 25 - 30