PEKSrand: Providing Predicate Privacy in Public-key Encryption with Keyword Search

被引:0
|
作者
Zhu, Benwen [1 ]
Zhu, Bo [1 ]
Ren, Kui [2 ]
机构
[1] Concordia Univ, CIISE, Montreal, PQ, Canada
[2] IIT, ECE, Chicago, IL USA
关键词
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Recently, Shen, Shi, and Waters introduced the notion of predicate privacy, and proposed a scheme that achieves predicate privacy in the symmetric-key settings. In this paper, we propose two schemes. In the first scheme, we extend PEKS to support predicate privacy based on the idea of randomization. To the best of our knowledge, this is the first work that ensures predicate privacy in the public-key settings without requiring interactions between the receiver and potential senders, the size of which may be very large. Moreover, we identify a new type of attacks against PEKS, i.e., statistical guessing attacks. Accordingly, we introduce a new notion called statistics privacy, i.e., the property that predicate privacy is preserved even when the statistical distribution of keywords is known. The second scheme we proposed makes a tradeoff between statistics privacy and storage efficiency (of the delegate). Compared to PEKS, both schemes introduce reasonable communication and computation overheads and can be smoothly deployed in existing systems.
引用
收藏
页数:6
相关论文
共 50 条
  • [21] Public-key encryption with keyword search secure against continual memory attacks
    Hu, Chengyu
    Yang, Rupeng
    Liu, Pengtao
    Yu, Zuoxia
    Zhou, Yongbin
    Xu, Qiuliang
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (11) : 1613 - 1629
  • [22] Public-key authenticated encryption with keyword search revisited: Security model and constructions
    Qin, Baodong
    Chen, Yu
    Huang, Qiong
    Liu, Ximeng
    Zheng, Dong
    INFORMATION SCIENCES, 2020, 516 : 515 - 528
  • [23] Public-key encryption with bidirectional keyword search and its application to encrypted emails
    Zhang, Wenzheng
    Qin, Baodong
    Dong, Xinfeng
    Tian, Aikui
    COMPUTER STANDARDS & INTERFACES, 2021, 78
  • [24] Lightweight Multi-User Public-Key Authenticated Encryption With Keyword Search
    Xu, Yongliang
    Cheng, Hang
    Li, Jiguo
    Liu, Ximeng
    Zhang, Xinpeng
    Wang, Meiqing
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2025, 20 : 3234 - 3246
  • [25] Chosen-Ciphertext Attack Secure Public-Key Encryption with Keyword Search
    Rhee, Hyun Sook
    CMC-COMPUTERS MATERIALS & CONTINUA, 2022, 73 (01): : 69 - 85
  • [26] Public key encryption with keyword search
    Boneh, D
    Di Crescenzo, G
    Ostrovsky, R
    Persiano, G
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2004, PROCEEDINGS, 2004, 3027 : 506 - 522
  • [27] Combining Public Key Encryption with Keyword Search and Public Key Encryption
    Zhang, Rui
    Imai, Hideki
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2009, E92D (05) : 888 - 896
  • [28] Public-Key Authenticated Encryption With Keyword Search Supporting Constant Trapdoor Generation and Fast Search
    Li, Hongbo
    Huang, Qiong
    Huang, Jianye
    Susilo, Willy
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2023, 18 : 396 - 410
  • [29] Public-Key Encryption with Delegated Search
    Ibraimi, Luan
    Nikova, Svetla
    Hartel, Pieter
    Jonker, Willem
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY (ACNS 2011), 2011, 6715 : 532 - 549
  • [30] Public-Key Encryption with Fuzzy Keyword Search: A Provably Secure Scheme under Keyword Guessing Attack
    Xu, Peng
    Jin, Hai
    Wu, Qianhong
    Wang, Wei
    IEEE TRANSACTIONS ON COMPUTERS, 2013, 62 (11) : 2266 - 2277