The Public Verifiability of Public Key Encryption with Keyword Search

被引:0
|
作者
Zhu, Binrui [1 ]
Sun, Jiameng [1 ]
Qin, Jing [1 ,2 ]
Ma, Jixin [3 ]
机构
[1] Shandong Univ, Sch Math, Jinan, Shandong, Peoples R China
[2] Chinese Acad Sci, Inst Informat Engn, State Key Lab Informat Secur, Beijing, Peoples R China
[3] Univ Greenwich, Sch Comp & Math Sci, London, England
关键词
Cloud computing; PEKS; Public verifiability; Indistinguishability; CLOUD;
D O I
10.1007/978-3-319-90775-8_24
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud computing has been widely recognized as the next big thing in this era. Users outsourced data to cloud server and cloud server provided service economic savings and various convenience for users. Public key encryption with keyword search (PEKS) which provides a solution for a third party user to search on remote data encrypted by data owner. Since the server may be dishonest, it can perform search operation on encrypted data and only return partial results. Therefore, it is necessary to verify the correctness and completeness of the search result. Existing PEKS schemes only support data receiver's private verification, however, in practice, we usually need anyone can verify the server's search result. In this paper, we propose a PEKS with public verifiability scheme, which can achieve the security of ciphertext indistinguishability, trapdoor indistinguishability, keyword guessing attack and public verifiability. Comparing previous PEKS schemes, our scheme is public verifiability, while keeping the encrypted data security in cloud server and search operation privately over the encrypted data.
引用
收藏
页码:299 / 312
页数:14
相关论文
共 50 条
  • [11] Public key encryption with conjunctive field keyword search
    Park, DJ
    Kim, K
    Lee, PJ
    [J]. INFORMATION SECURITY APPLICATIONS, 2005, 3325 : 73 - 86
  • [12] Public Key Encryption with Multi-keyword Search
    Hu, Chengyu
    He, Peng
    Liu, Pengtao
    [J]. NETWORK COMPUTING AND INFORMATION SECURITY, 2012, 345 : 568 - +
  • [13] Public key encryption with temporary and fuzzy keyword search
    Vaanchig, Nyamsuren
    Qin, Zhiguang
    [J]. MATHEMATICAL BIOSCIENCES AND ENGINEERING, 2019, 16 (05) : 3914 - 3935
  • [14] On the Security of a Certificateless Public Key Encryption with Keyword Search
    Wu, Tsu-Yang
    Meng, Chao
    Chen, Chien-Ming
    Wang, King-Hang
    Pan, Jeng-Shyang
    [J]. ADVANCES IN INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING, PT I, 2018, 81 : 191 - 197
  • [15] Public-Key Encryption with Integrated Keyword Search
    Vishal Saraswat
    Rajeev Anand Sahu
    Gaurav Sharma
    Veronika Kuchta
    Olivier Markowitch
    [J]. Journal of Hardware and Systems Security, 2019, 3 (1) : 12 - 25
  • [16] Efficient public key encryption with revocable keyword search
    Yu, Yong
    Ni, Jianbing
    Yang, Haomiao
    Mu, Yi
    Susilo, Willy
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2014, 7 (02) : 466 - 472
  • [17] Revocable Public Key Encryption with Authorized Keyword Search
    Xu, Wujing
    Dong, Xiaolei
    Cao, Zhenfu
    Shen, Jiachen
    [J]. PROCEEDINGS OF 2019 IEEE 3RD INFORMATION TECHNOLOGY, NETWORKING, ELECTRONIC AND AUTOMATION CONTROL CONFERENCE (ITNEC 2019), 2019, : 857 - 860
  • [18] Public Key Encryption with Keyword Search in Cloud: A Survey
    Zhou, Yunhong
    Li, Na
    Tian, Yanmei
    An, Dezhi
    Wang, Licheng
    [J]. ENTROPY, 2020, 22 (04)
  • [19] On Improving the Performance of Public Key Encryption with Keyword Search
    Long, Bin
    Gu, Dawu
    Ding, Ning
    Lu, Haining
    [J]. 2012 INTERNATIONAL CONFERENCE ON CLOUD COMPUTING AND SERVICE COMPUTING (CSC), 2012, : 143 - 147
  • [20] PUBLIC KEY ENCRYPTION WITH KEYWORD SEARCH BASED ON FACTORING
    Luo, Wenjun
    Tan, Jianming
    [J]. 2012 IEEE 2ND INTERNATIONAL CONFERENCE ON CLOUD COMPUTING AND INTELLIGENT SYSTEMS (CCIS) VOLS 1-3, 2012, : 1245 - 1247