Hidden-Token Searchable Public-Key Encryption

被引:2
|
作者
Zuo, Cong [1 ]
Shao, Jun [1 ]
Liu, Zhe [2 ]
Ling, Yun [1 ]
Wei, Guiyi [1 ]
机构
[1] Zhejiang Gongshang Univ, Sch Comp & Informat Engn, Hangzhou, Zhejiang, Peoples R China
[2] Univ Luxembourg, APSIA, Interdisciplinary Ctr Secur Reliabil & Trust SnT, Luxembourg, Luxembourg
关键词
Searchable Encryption; Public-Key; Hidden-Token; Random Oracle Model;
D O I
10.1109/Trustcom/BigDataSE/ICESS.2017.244
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we propose a variant of searchable public-key encryption named hidden-token searchable public-key encryption with two new security properties: token anonymity and one-token-per-trapdoor. With the former security notion, the client can obtain the search token from the data owner without revealing any information about the underlying keyword. Meanwhile, the client cannot derive more than one token from one trapdoor generated by the data owner according to the latter security notion. Furthermore, we present a concrete hidden token searchable public-key encryption scheme together with the security proofs in the random oracle model.
引用
收藏
页码:248 / 254
页数:7
相关论文
共 50 条
  • [1] Security-enhanced public-key authenticated searchable encryption
    Cheng, Leixiao
    Qin, Jing
    Feng, Feng
    Meng, Fei
    [J]. INFORMATION SCIENCES, 2023, 647
  • [2] Multi-keyword ranked searchable public-key encryption
    Hu, Chengyu
    Yang, Bo
    Liu, Pengtao
    [J]. INTERNATIONAL JOURNAL OF GRID AND UTILITY COMPUTING, 2015, 6 (3-4) : 221 - 231
  • [3] Trapdoor security in a searchable public-key encryption scheme with a designated tester
    Rhee, Hyun Sook
    Park, Jong Hwan
    Susilo, Willy
    Lee, Dong Hoon
    [J]. JOURNAL OF SYSTEMS AND SOFTWARE, 2010, 83 (05) : 763 - 771
  • [4] Searchable Public-Key Encryption With Cryptographic Reverse Firewalls for Cloud Storage
    Zhou, Yuyang
    Hu, Zhebin
    Li, Fagen
    [J]. IEEE TRANSACTIONS ON CLOUD COMPUTING, 2023, 11 (01) : 383 - 396
  • [5] PUBLIC-KEY ENCRYPTION
    STUBBS, E
    [J]. EDN MAGAZINE-ELECTRICAL DESIGN NEWS, 1984, 29 (04): : 29 - 29
  • [6] Generating Searchable Public-Key Ciphertexts With Hidden Structures for Fast Keyword Search
    Xu, Peng
    Wu, Qianhong
    Wang, Wei
    Susilo, Willy
    Domingo-Ferrer, Josep
    Jin, Hai
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2015, 10 (09) : 1993 - 2006
  • [7] Lightweight Searchable Public-Key Encryption for Cloud-Assisted Wireless Sensor Networks
    Xu, Peng
    He, Shuanghong
    Wang, Wei
    Susilo, Willy
    Jin, Hai
    [J]. IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2018, 14 (08) : 3712 - 3723
  • [8] Searchable Public-Key Encryption with Data Sharing in Dynamic Groups for Mobile Cloud Storage
    Xia, Qi
    Ni, Jianbing
    Kanpogninge, Ansuura John Bosco Aristotle
    Gee, James C.
    [J]. JOURNAL OF UNIVERSAL COMPUTER SCIENCE, 2015, 21 (03) : 440 - 453
  • [9] Lightweight Searchable Public-Key Encryption with Forward Privacy over IIoT Outsourced Data
    Chen, Biwen
    Wu, Libing
    Kumar, Neeraj
    Choo, Kim-Kwang Raymond
    He, Debiao
    [J]. IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING, 2021, 9 (04) : 1753 - 1764
  • [10] Lattice-based searchable public-key encryption scheme for secure cloud storage
    Xie, Run
    Xu, Chunxiang
    He, Chanlian
    Zhang, Xiaojun
    [J]. INTERNATIONAL JOURNAL OF WEB AND GRID SERVICES, 2018, 14 (01) : 3 - 20