PEKSrand: Providing Predicate Privacy in Public-key Encryption with Keyword Search

被引:0
|
作者
Zhu, Benwen [1 ]
Zhu, Bo [1 ]
Ren, Kui [2 ]
机构
[1] Concordia Univ, CIISE, Montreal, PQ, Canada
[2] IIT, ECE, Chicago, IL USA
关键词
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Recently, Shen, Shi, and Waters introduced the notion of predicate privacy, and proposed a scheme that achieves predicate privacy in the symmetric-key settings. In this paper, we propose two schemes. In the first scheme, we extend PEKS to support predicate privacy based on the idea of randomization. To the best of our knowledge, this is the first work that ensures predicate privacy in the public-key settings without requiring interactions between the receiver and potential senders, the size of which may be very large. Moreover, we identify a new type of attacks against PEKS, i.e., statistical guessing attacks. Accordingly, we introduce a new notion called statistics privacy, i.e., the property that predicate privacy is preserved even when the statistical distribution of keywords is known. The second scheme we proposed makes a tradeoff between statistics privacy and storage efficiency (of the delegate). Compared to PEKS, both schemes introduce reasonable communication and computation overheads and can be smoothly deployed in existing systems.
引用
收藏
页数:6
相关论文
共 50 条
  • [31] Efficient Keyword Search for Public-Key Setting
    Zhang, Rui
    Xue, Rui
    2015 IEEE MILITARY COMMUNICATIONS CONFERENCE (MILCOM 2015), 2015, : 1236 - 1241
  • [32] Re-PAEKS: Public-Key Authenticated Re-Encryption With Keyword Search
    Luo, Fucai
    Wang, Haiyan
    Yan, Xingfu
    IEEE TRANSACTIONS ON MOBILE COMPUTING, 2024, 23 (10) : 10077 - 10092
  • [33] Verifiable Public-Key Encryption with Keyword Search Secure against Continual Memory Attacks
    Chengyu Hu
    Zhen Li
    Pengtao Liu
    Rupeng Yang
    Shanqing Guo
    Hailong Zhang
    Mobile Networks and Applications, 2021, 26 : 2490 - 2500
  • [34] Dual-Server Public-Key Encryption With Keyword Search for Secure Cloud Storage
    Chen, Rongmao
    Mu, Yi
    Yang, Guomin
    Guo, Fuchun
    Wang, Xiaofen
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2016, 11 (04) : 789 - 798
  • [35] Verifiable Public-Key Encryption with Keyword Search Secure against Continual Memory Attacks
    Hu, Chengyu
    Li, Zhen
    Liu, Pengtao
    Yang, Rupeng
    Guo, Shanqing
    Zhang, Hailong
    MOBILE NETWORKS & APPLICATIONS, 2021, 26 (06): : 2490 - 2500
  • [36] Generic combination of public key encryption with keyword search and public key encryption
    Zhang, Rui
    Imai, Hideki
    CRYPTOLOGY AND NETWORK SECURITY, 2007, 4856 : 159 - 174
  • [37] On the integration of public key data encryption and public key encryption with keyword search
    Baek, Joonsang
    Safavi-Naini, Reihaneh
    Susilo, Willy
    INFORMATION SECURITY, PROCEEDINGS, 2006, 4176 : 217 - 232
  • [38] Blockchain-Assisted Public-Key Encryption with Keyword Search Against Keyword Guessing Attacks for Cloud Storage
    Zhang, Yuan
    Xu, Chunxiang
    Ni, Jianbing
    Li, Hongwei
    Shen, Xuemin
    IEEE TRANSACTIONS ON CLOUD COMPUTING, 2021, 9 (04) : 1335 - 1348
  • [39] Public-key encryption with keyword search: a generic construction secure against online and offline keyword guessing attacks
    Mahnaz Noroozi
    Ziba Eslami
    Journal of Ambient Intelligence and Humanized Computing, 2020, 11 : 879 - 890
  • [40] Public-key encryption with keyword search: a generic construction secure against online and offline keyword guessing attacks
    Noroozi, Mahnaz
    Eslami, Ziba
    JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2020, 11 (02) : 879 - 890