Efficient public key encryption with user-friendly keywords search for searchable cloud storage

被引:0
作者
Chen, Kuo-Chang [1 ]
Chen, Yu-Chi [2 ]
Horng, Gwoboa [1 ]
Tso, Raylin [3 ]
机构
[1] Natl Chung Hsing Univ, Dept Comp Sci & Engn, Taichung, Taiwan
[2] Acad Sinica, Inst Informat Sci, Taipei, Taiwan
[3] Natl Chengchi Univ, Dept Comp Sci, Taipei, Taiwan
来源
INTELLIGENT SYSTEMS AND APPLICATIONS (ICS 2014) | 2015年 / 274卷
关键词
Searchable encryption; keyword search; trapdoor; cloud storage; security; SECURITY; SUBSET;
D O I
10.3233/978-1-61499-484-8-724
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Protecting private data becomes very important in communication with the widespread adoption of the cloud storage system; for example, Drop-box, SkyDrive and iCloud. A user should be able to access his private data from cloud, and efficiently retrieves data which he wants. In fact, a straightforward solution to protecting user's private data is encryption. Relying on keyword search over the encrypted data is very useful and efficient to retrieve from the untrusted cloud storage. In this scenario, a sender can send encrypted data, and the receiver can generate trapdoors from keywords to retrieve those data which include the keywords. Recently, Zhang and Zhang proposed a field-free public key encryption with user-friendly keywords search. In this paper, we present a searchable public key encryption with user-friendly keywords search. The proposed scheme is secure based on secret sharing and the hardness of discrete logarithm problem. It is more efficient than Zhang and Zhang's scheme on computation. Moreover, we also analyze that this scheme satisfies some properties, which is suitable to data deliver/retrieval in cloud storage.
引用
收藏
页码:724 / 733
页数:10
相关论文
共 23 条
[1]   Searchable encryption revisited: Consistency properties, relation to anonymous IBE, and extensions [J].
Abdalla, Michel ;
Bellare, Mihir ;
Catalano, Dario ;
Kiltz, Eike ;
Kohno, Tadayoshi ;
Lange, Tanja ;
Malone-Lee, John ;
Neven, Gregory ;
Paillier, Pascal ;
Shi, Haixia .
JOURNAL OF CRYPTOLOGY, 2008, 21 (03) :350-391
[2]  
[Anonymous], P INT WORKSH INF SEC
[3]  
[Anonymous], LNCS
[4]  
Baek J, 2005, LECT NOTES COMPUT SC, V3650, P134
[5]  
Baek J, 2008, LECT NOTES COMPUT SC, V5072, P1249, DOI 10.1007/978-3-540-69839-5_96
[6]  
Ballard L, 2005, LECT NOTES COMPUT SC, V3783, P414
[7]  
Boneh D, 2007, LECT NOTES COMPUT SC, V4392, P535
[8]   On a security model of conjunctive keyword search over encrypted relational database [J].
Byun, Jin Wook ;
Lee, Dong Hoon .
JOURNAL OF SYSTEMS AND SOFTWARE, 2011, 84 (08) :1364-1372
[9]   SPEKS: Secure Server-Designation Public Key Encryption with Keyword Search against Keyword Guessing Attacks [J].
Chen, Yu-Chi .
COMPUTER JOURNAL, 2015, 58 (04) :922-933
[10]   Anonymous Multireceiver Identity-Based Encryption [J].
Fan, Chun-I ;
Huang, Ling-Ying ;
Ho, Pei-Hsiu .
IEEE TRANSACTIONS ON COMPUTERS, 2010, 59 (09) :1239-1249