Searching Keywords with Wildcards on Encrypted Data

被引:0
|
作者
Sedghi, Saeed [1 ]
van Liesdonk, Peter [2 ]
Nikova, Svetla [1 ,3 ]
Hartel, Pieter [1 ]
Jonker, Willem [1 ,4 ]
机构
[1] Univ Twente, Dept EWI DIES, POB 217, NL-7500 AE Enschede, Netherlands
[2] T U Eindhoven, Dept Math & Comp Sci, Eindhoven, Netherlands
[3] K U Leuven, Dept ESAT SCD COSIC & IBBT, Heverlee, Belgium
[4] Philips Res Labs, Amsterdam, Netherlands
来源
关键词
IDENTITY-BASED ENCRYPTION; HIDDEN-VECTOR ENCRYPTION;
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
A hidden vector encryption scheme (FIVE) is a derivation of identity-based encryption, where the public key is actually a vector over a certain alphabet. The decryption key is also derived from such a vector, but this one is also allowed to have "star" (or wildcard) entries. Decryption is possible as long as these tuples agree on every position except where a "star" occurs. These schemes are useful for a variety of applications: they can be used as a building block to construct attribute-based encryption schemes and sophisticated predicate encryption schemes (for e.g. range or subset queries). Another interesting application - and our main motivation - is to create searchable encryption schemes that support queries for keywords containing wildcards. Here we construct a new HVE scheme, based on bilinear groups of prime order, which supports vectors over any alphabet. The resulting ciphertext length is equally shorter than existing schemes, depending on a trade-off. The length of the decryption key and the computational complexity of decryption are both constant, unlike existing schemes where these are both dependent on the amount of non-wildcard symbols associated to the decryption key. Our construction hides both the plaintext and public key used for encryption. We prove security in a selective model, under the decision linear assumption.
引用
收藏
页码:138 / +
页数:4
相关论文
共 50 条
  • [1] Search Ranges Efficiently and Compatibly as Keywords over Encrypted Data
    Wang, Boyang
    Fan, Xinxin
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2018, 15 (06) : 1027 - 1040
  • [2] Using secret sharing for searching in encrypted data
    Brinkman, R
    Doumen, J
    Jonker, W
    SECURE DATA MANAGEMENT, PROCEEDINGS, 2004, 3178 : 18 - 27
  • [3] Search geometric ranges efficiently as keywords over encrypted spatial data
    Guo, Ruoyang
    Qin, Bo
    Wu, Yuncheng
    Chen, Hong
    Li, Cuiping
    HIGH-CONFIDENCE COMPUTING, 2022, 2 (02):
  • [4] Fast Multi-keywords Search over Encrypted Cloud Data
    Hong, Cheng
    Li, Yifu
    Zhang, Min
    Feng, Dengguo
    WEB INFORMATION SYSTEMS ENGINEERING - WISE 2016, PT I, 2016, 10041 : 433 - 446
  • [5] Enabling verifiable multiple keywords search over encrypted cloud data
    Miao, Yinbin
    Weng, Jian
    Liu, Ximeng
    Choo, Kim-Kwang Raymond
    Liu, Zhiquan
    Li, Hongwei
    INFORMATION SCIENCES, 2018, 465 : 21 - 37
  • [6] Preserving Privacy of Co-occurring Keywords over Encrypted Data
    Kumar, D. V. N. Siva
    Thilagam, P. Santhi
    DATA AND APPLICATIONS SECURITY AND PRIVACY XXXV, 2021, 12840 : 157 - 168
  • [7] Nothing is for Free: Security in Searching Shared and Encrypted Data
    Tang, Qiang
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2014, 9 (11) : 1943 - 1952
  • [8] A FHE-based Evaluation for Searching on Encrypted Data
    Togan, Mihai
    2016 INTERNATIONAL CONFERENCE ON COMMUNICATIONS (COMM 2016), 2016, : 291 - 296
  • [9] Searching Encrypted Data with Size-Locked Indexes
    Xu, Min
    Namavari, Armin
    Cash, David
    Ristenpart, Thomas
    PROCEEDINGS OF THE 30TH USENIX SECURITY SYMPOSIUM, 2021, : 4025 - 4042
  • [10] Recent Developments in Searching Over Encrypted Cloud Data
    Mittal, Sneha A.
    Krishna, C. Rama
    2016 5TH INTERNATIONAL CONFERENCE ON RELIABILITY, INFOCOM TECHNOLOGIES AND OPTIMIZATION (TRENDS AND FUTURE DIRECTIONS) (ICRITO), 2016, : 338 - 342