Searchable encryption with randomized ciphertext and randomized keyword search

被引:0
|
作者
Calderini, Marco [1 ]
Longo, Riccardo [1 ,2 ]
Sala, Massimiliano [1 ]
Villa, Irene [1 ,3 ]
机构
[1] Univ Trento, Dept Math, Via Sommar 14, I-38123 Povo, Trento, Italy
[2] Fdn Bruno Kessler, Ctr Cybersecur, Via Sommar 18, I-38123 Povo, Trento, Italy
[3] Univ Genoa, Dept Math, Excellence Dept 2023 2027, Via Dodecaneso 35, I-16146 Genoa, Italy
关键词
searchable encryption; PAEKS scheme; cloud cryptography; bilinear pairings; PUBLIC-KEY ENCRYPTION; GUESSING ATTACKS; AUTHENTICATED ENCRYPTION; SCHEMES; SECURE;
D O I
10.1515/jmc-2023-0029
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The notion of public-key encryption with keyword search (PEKS) was introduced to search over encrypted data without performing any decryption. In this article, we propose a PEKS scheme in which both the encrypted keyword and the trapdoor are randomized so that the cloud server is not able to recognize identical queries a priori. Our scheme is Ciphertext-Indistinguishabiltity secure in the single-user setting and Trapdoor-Indistinguishability secure in the multi-user setting with a stronger security, i.e., with multi-trapdoor.
引用
收藏
页数:14
相关论文
共 50 条
  • [21] Identity-Based Group Encryption With Keyword Search Against Keyword Guessing Attack
    Wang, Wei
    Liu, Dongli
    Zheng, Zilin
    Xu, Peng
    Yang, Laurence Tianruo
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2024, 19 : 8023 - 8036
  • [22] Trapdoor Privacy in Public Key Encryption With Keyword Search: A Review
    Chan, Koon-Ming
    Heng, Swee-Huay
    Yau, Wei-Chuen
    Tan, Shing-Chiang
    IEEE ACCESS, 2022, 10 : 21584 - 21598
  • [23] A ciphertext-policy hidden vector encryption scheme supporting multiuser keyword search
    Liao Zhenhua
    Wang Jinmiao
    Lang Bo
    SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (06) : 879 - 887
  • [24] Privacy-Preserving Multi-Keyword Searchable Encryption for Distributed Systems
    Liu, Xueqiao
    Yang, Guomin
    Susilo, Willy
    Tonien, Joseph
    Liu, Ximeng
    Shen, Jian
    IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2021, 32 (03) : 561 - 574
  • [25] Chosen-Ciphertext Attack Secure Public-Key Encryption with Keyword Search
    Rhee, Hyun Sook
    CMC-COMPUTERS MATERIALS & CONTINUA, 2022, 73 (01): : 69 - 85
  • [26] Hidden Policy Ciphertext-policy Attribute Based Encryption with Conjunctive Keyword Search
    Sun, Lixue
    Xu, Chunxiang
    PROCEEDINGS OF 2017 3RD IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATIONS (ICCC), 2017, : 1439 - 1443
  • [27] A Dynamic Searchable Encryption Scheme for Secure Cloud Server Operation Reserving Multi-keyword Ranked Search
    Kabir, Tasnim
    Adnan, Muhammad Abdullah
    PROCEEDINGS OF 2017 4TH INTERNATIONAL CONFERENCE ON NETWORKING, SYSTEMS AND SECURITY (NSYSS), 2017, : 80 - 88
  • [28] Hierarchical ID-Based Searchable Encryption with Constant Size Ciphertext in Cloud
    Wang, Xiaofen
    Zhang, Xiaosong
    Mu, Yi
    2015 IEEE INTERNATIONAL CONFERENCE ON SMART CITY/SOCIALCOM/SUSTAINCOM (SMARTCITY), 2015, : 1024 - 1031
  • [29] Search pattern leakage in searchable encryption: Attacks and new construction
    Liu, Chang
    Zhu, Liehuang
    Wang, Mingzhong
    Tan, Yu-an
    INFORMATION SCIENCES, 2014, 265 : 176 - 188
  • [30] Privacy protection in social applications: A ciphertext policy attribute-based encryption with keyword search
    Shi, Junbin
    Yu, Qiming
    Yu, Yong
    Wang, Lianhai
    Zhang, Wenzheng
    INTERNATIONAL JOURNAL OF INTELLIGENT SYSTEMS, 2022, 37 (12) : 12152 - 12168