The Public Verifiability of Public Key Encryption with Keyword Search

被引:0
|
作者
Zhu, Binrui [1 ]
Sun, Jiameng [1 ]
Qin, Jing [1 ,2 ]
Ma, Jixin [3 ]
机构
[1] Shandong Univ, Sch Math, Jinan, Shandong, Peoples R China
[2] Chinese Acad Sci, Inst Informat Engn, State Key Lab Informat Secur, Beijing, Peoples R China
[3] Univ Greenwich, Sch Comp & Math Sci, London, England
关键词
Cloud computing; PEKS; Public verifiability; Indistinguishability; CLOUD;
D O I
10.1007/978-3-319-90775-8_24
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud computing has been widely recognized as the next big thing in this era. Users outsourced data to cloud server and cloud server provided service economic savings and various convenience for users. Public key encryption with keyword search (PEKS) which provides a solution for a third party user to search on remote data encrypted by data owner. Since the server may be dishonest, it can perform search operation on encrypted data and only return partial results. Therefore, it is necessary to verify the correctness and completeness of the search result. Existing PEKS schemes only support data receiver's private verification, however, in practice, we usually need anyone can verify the server's search result. In this paper, we propose a PEKS with public verifiability scheme, which can achieve the security of ciphertext indistinguishability, trapdoor indistinguishability, keyword guessing attack and public verifiability. Comparing previous PEKS schemes, our scheme is public verifiability, while keeping the encrypted data security in cloud server and search operation privately over the encrypted data.
引用
收藏
页码:299 / 312
页数:14
相关论文
共 50 条
  • [1] Combining Public Key Encryption with Keyword Search and Public Key Encryption
    Zhang, Rui
    Imai, Hideki
    [J]. IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2009, E92D (05) : 888 - 896
  • [2] Public key encryption with keyword search
    Boneh, D
    Di Crescenzo, G
    Ostrovsky, R
    Persiano, G
    [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2004, PROCEEDINGS, 2004, 3027 : 506 - 522
  • [3] Generic combination of public key encryption with keyword search and public key encryption
    Zhang, Rui
    Imai, Hideki
    [J]. CRYPTOLOGY AND NETWORK SECURITY, 2007, 4856 : 159 - 174
  • [4] On the integration of public key data encryption and public key encryption with keyword search
    Baek, Joonsang
    Safavi-Naini, Reihaneh
    Susilo, Willy
    [J]. INFORMATION SECURITY, PROCEEDINGS, 2006, 4176 : 217 - 232
  • [5] Public key encryption with keyword search revisited
    Baek, Joonsang
    Safavi-Naini, Reihaneh
    Susilo, Willy
    [J]. COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2008, PT 1, PROCEEDINGS, 2008, 5072 : 1249 - 1259
  • [6] Public Key Encryption with Wildcards Keyword Search
    Wang, Zhao-li
    Han, Jin-li
    Wang, Mei-juan
    Shi, Ya-qing
    Dong, Hui
    [J]. 2018 EIGHTH INTERNATIONAL CONFERENCE ON INSTRUMENTATION AND MEASUREMENT, COMPUTER, COMMUNICATION AND CONTROL (IMCCC 2018), 2018, : 538 - 541
  • [7] Certificateless Public Key Encryption with Keyword Search
    Peng Yanguo
    Cui Jiangtao
    Peng Changgen
    Ying Zuobin
    [J]. CHINA COMMUNICATIONS, 2014, 11 (11) : 100 - 113
  • [8] Public key encryption with distributed keyword search
    Eslami, Ziba
    Noroozi, Mahnaz
    Amirizirtol, Kobra
    [J]. JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2022, 25 (08): : 2369 - 2393
  • [9] Public key encryption with conjunctive keyword search on lattice
    Wang, Peng
    Xiang, Tao
    Li, Xiaoguo
    Xiang, Hong
    [J]. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2020, 51
  • [10] Public-Key Encryption with Registered Keyword Search
    Tang, Qiang
    Chen, Liqun
    [J]. PUBLIC KEY INFRASTRUCTURES, SERVICES AND APPLICATIONS, 2010, 6391 : 163 - +