Searching Keywords with Wildcards on Encrypted Data

被引:0
|
作者
Sedghi, Saeed [1 ]
van Liesdonk, Peter [2 ]
Nikova, Svetla [1 ,3 ]
Hartel, Pieter [1 ]
Jonker, Willem [1 ,4 ]
机构
[1] Univ Twente, Dept EWI DIES, POB 217, NL-7500 AE Enschede, Netherlands
[2] T U Eindhoven, Dept Math & Comp Sci, Eindhoven, Netherlands
[3] K U Leuven, Dept ESAT SCD COSIC & IBBT, Heverlee, Belgium
[4] Philips Res Labs, Amsterdam, Netherlands
来源
关键词
IDENTITY-BASED ENCRYPTION; HIDDEN-VECTOR ENCRYPTION;
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
A hidden vector encryption scheme (FIVE) is a derivation of identity-based encryption, where the public key is actually a vector over a certain alphabet. The decryption key is also derived from such a vector, but this one is also allowed to have "star" (or wildcard) entries. Decryption is possible as long as these tuples agree on every position except where a "star" occurs. These schemes are useful for a variety of applications: they can be used as a building block to construct attribute-based encryption schemes and sophisticated predicate encryption schemes (for e.g. range or subset queries). Another interesting application - and our main motivation - is to create searchable encryption schemes that support queries for keywords containing wildcards. Here we construct a new HVE scheme, based on bilinear groups of prime order, which supports vectors over any alphabet. The resulting ciphertext length is equally shorter than existing schemes, depending on a trade-off. The length of the decryption key and the computational complexity of decryption are both constant, unlike existing schemes where these are both dependent on the amount of non-wildcard symbols associated to the decryption key. Our construction hides both the plaintext and public key used for encryption. We prove security in a selective model, under the decision linear assumption.
引用
收藏
页码:138 / +
页数:4
相关论文
共 50 条
  • [21] Searching activity trajectory with keywords
    Zheng, Bolong
    Zheng, Kai
    Scheuermann, Peter
    Zhou, Xiaofang
    Quoc Viet Hung Nguyen
    Li, Chenliang
    WORLD WIDE WEB-INTERNET AND WEB INFORMATION SYSTEMS, 2019, 22 (03): : 967 - 1000
  • [22] An Efficient Search Method Using Features to Match Joint Keywords on Encrypted Cloud Data
    Tao, Lingbing
    Xu, Hui
    Shu, Ying
    Tie, Zhixin
    IEEE ACCESS, 2022, 10 : 42836 - 42843
  • [23] Efficient Boolean Keywords Search over Encrypted Cloud Data in Public Key Setting
    Zhang, Yu
    He, Wei
    Li, Yin
    MOBILE INFORMATION SYSTEMS, 2020, 2020
  • [24] An Efficient Search Method Using Features to Match Joint Keywords on Encrypted Cloud Data
    Tao, Lingbing
    Xu, Hui
    Shu, Ying
    Tie, Zhixin
    IEEE Access, 2022, 10 : 42836 - 42843
  • [25] Periodicity in Data Streams with Wildcards
    Ergun, Funda
    Grigorescu, Elena
    Azer, Erfan Sadeqi
    Zhou, Samson
    COMPUTER SCIENCE - THEORY AND APPLICATIONS, CSR 2018, 2018, 10846 : 90 - 105
  • [26] Periodicity in Data Streams with Wildcards
    Ergun, Funda
    Grigorescu, Elena
    Azer, Erfan Sadeqi
    Zhou, Samson
    THEORY OF COMPUTING SYSTEMS, 2020, 64 (01) : 177 - 197
  • [27] Periodicity in Data Streams with Wildcards
    Funda Ergün
    Elena Grigorescu
    Erfan Sadeqi Azer
    Samson Zhou
    Theory of Computing Systems, 2020, 64 : 177 - 197
  • [28] CloudDBGuard: Enabling Sorting and Searching on Encrypted Data in NoSQL Cloud Databases
    Waage, Tim
    Wiese, Lena
    BIG DATA ANALYTICS AND KNOWLEDGE DISCOVERY (DAWAK 2018), 2018, 11031 : 261 - 270
  • [29] Contextual Oblivious Similarity Searching for Encrypted Data on Cloud Storage Services
    Lavnis, Sneha Umesh
    Elango, Divyaa Manimaran
    Gonzalez-Velez, Horacio
    2018 IEEE 8TH INTERNATIONAL SYMPOSIUM ON CLOUD AND SERVICE COMPUTING (SC2), 2018, : 77 - 82
  • [30] Semantic-Aware Searching Over Encrypted Data for Cloud Computing
    Fu, Zhangjie
    Xia, Lili
    Sun, Xingming
    Liu, Alex X.
    Xie, Guowu
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2018, 13 (09) : 2359 - 2371