Searching Keywords with Wildcards on Encrypted Data

被引:0
|
作者
Sedghi, Saeed [1 ]
van Liesdonk, Peter [2 ]
Nikova, Svetla [1 ,3 ]
Hartel, Pieter [1 ]
Jonker, Willem [1 ,4 ]
机构
[1] Univ Twente, Dept EWI DIES, POB 217, NL-7500 AE Enschede, Netherlands
[2] T U Eindhoven, Dept Math & Comp Sci, Eindhoven, Netherlands
[3] K U Leuven, Dept ESAT SCD COSIC & IBBT, Heverlee, Belgium
[4] Philips Res Labs, Amsterdam, Netherlands
来源
关键词
IDENTITY-BASED ENCRYPTION; HIDDEN-VECTOR ENCRYPTION;
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
A hidden vector encryption scheme (FIVE) is a derivation of identity-based encryption, where the public key is actually a vector over a certain alphabet. The decryption key is also derived from such a vector, but this one is also allowed to have "star" (or wildcard) entries. Decryption is possible as long as these tuples agree on every position except where a "star" occurs. These schemes are useful for a variety of applications: they can be used as a building block to construct attribute-based encryption schemes and sophisticated predicate encryption schemes (for e.g. range or subset queries). Another interesting application - and our main motivation - is to create searchable encryption schemes that support queries for keywords containing wildcards. Here we construct a new HVE scheme, based on bilinear groups of prime order, which supports vectors over any alphabet. The resulting ciphertext length is equally shorter than existing schemes, depending on a trade-off. The length of the decryption key and the computational complexity of decryption are both constant, unlike existing schemes where these are both dependent on the amount of non-wildcard symbols associated to the decryption key. Our construction hides both the plaintext and public key used for encryption. We prove security in a selective model, under the decision linear assumption.
引用
收藏
页码:138 / +
页数:4
相关论文
共 50 条
  • [31] Encrypted Phrase Searching in the Cloud
    Zittrower, Steven
    Zou, Cliff C.
    2012 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2012, : 764 - 770
  • [32] A framework for searching encrypted databases
    Alves, Pedro G. M. R.
    Aranha, Diego F.
    JOURNAL OF INTERNET SERVICES AND APPLICATIONS, 2018, 9 (09)
  • [33] VCSE: Verifiable conjunctive keywords search over encrypted data without secure-channel
    Miao, Yinbin
    Ma, Jianfeng
    Wei, Fushan
    Liu, Zhiquan
    Wang, Xu An
    Lu, Cunbo
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2017, 10 (04) : 995 - 1007
  • [34] An Efficient and Privacy-Preserving Ranked Fuzzy Keywords Search over Encrypted Cloud Data
    Ding, Shugeng
    Li, Yidong
    Zhang, Jianhui
    Chen, Liang
    Wang, Zhen
    Xu, Qunqun
    2016 INTERNATIONAL CONFERENCE ON BEHAVIORAL, ECONOMIC AND SOCIO-CULTURAL COMPUTING (BESC), 2016, : 151 - 156
  • [35] VCSE: Verifiable conjunctive keywords search over encrypted data without secure-channel
    Yinbin Miao
    Jianfeng Ma
    Fushan Wei
    Zhiquan Liu
    Xu An Wang
    Cunbo Lu
    Peer-to-Peer Networking and Applications, 2017, 10 : 995 - 1007
  • [36] Towards efficient privacy-preserving conjunctive keywords search over encrypted cloud data
    Liu, Yaru
    Xiao, Xiaodong
    Kong, Fanyu
    Zhang, Hanlin
    Yu, Jia
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2025, 166
  • [37] A Top-k Keywords Searching Approach based on the Relationship of Keywords
    Liu, Chunxiao
    Meng, Xiangfu
    Wei, Ke
    PROCEEDINGS 2012 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN, AND CYBERNETICS (SMC), 2012, : 2632 - 2637
  • [38] An Efficient Fuzzy Keyword Matching Technique for Searching Through Encrypted Cloud Data
    Ahsan, M. A. Manazir
    Chowdhury, Fahad Zaman
    Sabilah, Musarat
    Wahab, Ainuddin Wahid Bin Abdul
    Bin Idris, Mohd Yamani Idna
    2017 5TH INTERNATIONAL CONFERENCE ON RESEARCH AND INNOVATION IN INFORMATION SYSTEMS (ICRIIS 2017): SOCIAL TRANSFORMATION THROUGH DATA SCIENCE, 2017,
  • [39] Efficient Conjunctive Keywords Search over Encrypted E-Mail Data in Public Key Setting
    Zhang, Yu
    Li, Yin
    Wang, Yifan
    APPLIED SCIENCES-BASEL, 2019, 9 (18):
  • [40] A Secure Conjunctive Keywords Search over Encrypted Cloud Data Against Inclusion-Relation Attack
    Cai, Ke
    Hong, Cheng
    Zhang, Min
    Feng, Dengguo
    Lv, Zhiquan
    2013 IEEE FIFTH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING TECHNOLOGY AND SCIENCE (CLOUDCOM), VOL 1, 2013, : 339 - 346