Hidden-Token Searchable Public-Key Encryption

被引:2
|
作者
Zuo, Cong [1 ]
Shao, Jun [1 ]
Liu, Zhe [2 ]
Ling, Yun [1 ]
Wei, Guiyi [1 ]
机构
[1] Zhejiang Gongshang Univ, Sch Comp & Informat Engn, Hangzhou, Zhejiang, Peoples R China
[2] Univ Luxembourg, APSIA, Interdisciplinary Ctr Secur Reliabil & Trust SnT, Luxembourg, Luxembourg
关键词
Searchable Encryption; Public-Key; Hidden-Token; Random Oracle Model;
D O I
10.1109/Trustcom/BigDataSE/ICESS.2017.244
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we propose a variant of searchable public-key encryption named hidden-token searchable public-key encryption with two new security properties: token anonymity and one-token-per-trapdoor. With the former security notion, the client can obtain the search token from the data owner without revealing any information about the underlying keyword. Meanwhile, the client cannot derive more than one token from one trapdoor generated by the data owner according to the latter security notion. Furthermore, we present a concrete hidden token searchable public-key encryption scheme together with the security proofs in the random oracle model.
引用
收藏
页码:248 / 254
页数:7
相关论文
共 50 条
  • [21] An improved secure certificateless public-key searchable encryption scheme with multi-trapdoor privacy
    Yang, Guang
    Guo, Junling
    Han, Lidong
    Liu, Xuejiao
    Tian, Chengliang
    [J]. PEER-TO-PEER NETWORKING AND APPLICATIONS, 2022, 15 (01) : 503 - 515
  • [22] An improved secure certificateless public-key searchable encryption scheme with multi-trapdoor privacy
    Guang Yang
    Junling Guo
    Lidong Han
    Xuejiao Liu
    Chengliang Tian
    [J]. Peer-to-Peer Networking and Applications, 2022, 15 : 503 - 515
  • [23] PPSEB: A Postquantum Public-Key Searchable Encryption Scheme on Blockchain for E-Healthcare Scenarios
    Xu, Gang
    Xu, Shiyuan
    Cao, Yibo
    Yun, Fan
    Cui, Yu
    Yu, Yiying
    Xiao, Ke
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2022, 2022
  • [24] Efficient public-key searchable encryption against inside keyword guessing attacks for cloud storage
    Wu, Axin
    Li, Fagen
    Xin, Xiangjun
    Zhang, Yinghui
    Zhu, Jianhao
    [J]. JOURNAL OF SYSTEMS ARCHITECTURE, 2024, 149
  • [25] Trapdoor Security Lattice-Based Public-Key Searchable Encryption with a Designated Cloud Server
    Xiaojun Zhang
    Chunxiang Xu
    [J]. Wireless Personal Communications, 2018, 100 : 907 - 921
  • [26] A Parallel and Forward Private Searchable Public-Key Encryption for Cloud-Based Data Sharing
    Chen, Biwen
    Wu, Libing
    Li, Li
    Choo, Kim-Kwang Raymond
    He, Debiao
    [J]. IEEE ACCESS, 2020, 8 : 28009 - 28020
  • [27] An Efficient Searchable Public-Key Authenticated Encryption for Cloud-Assisted Medical Internet of Things
    Chi, Tianyu
    Qin, Baodong
    Zheng, Dong
    [J]. WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2020, 2020
  • [28] Generic Construction of Adaptively Secure Anonymous Key-Policy Attribute-Based Encryption from Public-Key Searchable Encryption
    Hayata, Jun'ichiro
    Ishizaka, Masahito
    Sakai, Yusuke
    Hanaoka, Goichiro
    Matsuura, Kanta
    [J]. PROCEEDINGS OF 2018 INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY AND ITS APPLICATIONS (ISITA2018), 2018, : 707 - 711
  • [29] Generic Construction of Adaptively Secure Anonymous Key-Policy Attribute-Based Encryption from Public-Key Searchable Encryption
    Hayata, Junichiro
    Ishizaka, Masahito
    Sakai, Yusuke
    Hanaoka, Goichiro
    Matsuura, Kanta
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2020, E103A (01) : 107 - 113
  • [30] A New Public-Key Encryption Scheme
    Hai-Bo Tian
    Xi Sun
    Yu-Min Wang
    [J]. Journal of Computer Science and Technology, 2007, 22 : 95 - 102