Public key encryption with searchable keywords based on Jacobi symbols

被引:0
作者
Di Crescenzo, Giovanni [1 ]
Saraswat, Vishal [2 ]
机构
[1] Telecordia Technol, Piscataway, NJ USA
[2] Univ Minnesota, Minneapolis, MN USA
来源
PROGRESS IN CRYPTOLOGY - INDOCRYPT 2007 | 2007年 / 4859卷
关键词
public-key encryption; searchable public-key encryption; quadratic residuosity; Jacobi symbol;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Public-key encryption schemes with searchable keywords are useful to delegate searching capabilities on encrypted data to a third party, who does not hold the entire secret key, but only an appropriate token which allows searching operations but preserves data privacy. Such notion was previously proved to imply identity-based public-key encryption [51 and to be equivalent to anonymous (or key-private) identity-based encryption which are useful for fully-private communication. So far all presented public-key encryption with keyword search (PEKS) schemes were based on bilinear forms and finding a PEKS that is not based on bilinear forms has been an open problem since the notion of PEKS was first introduced in [5]. We construct a public-key encryption scheme with keyword search based on a variant of the quadratic residuosity problem. We obtain our scheme using a non-trivial transformation of Cocks' identity-based encryption scheme [9]. Thus we show that the primitive of PEKS can be based on additional intractability assumptions which is a conventional desiderata about all cryptographic primitives.
引用
收藏
页码:282 / 296
页数:15
相关论文
共 17 条
[1]  
Abdalla M., 2005, LNCS, V3621
[2]  
Bellare M., 2001, LNCS, V2248
[3]  
Boneh D, 2004, LECT NOTES COMPUT SC, V3027, P506
[4]   Identity-based encryption from the Weil pairing [J].
Boneh, D ;
Franklin, M .
SIAM JOURNAL ON COMPUTING, 2003, 32 (03) :586-615
[5]  
BONEH D, 2007, COMMUNICATION FEB
[6]  
BONEH D, 2007, COMMUNICATION AUG
[7]  
BONEH D, UNPUB SPACE EFFICIEN
[8]  
BOYEN X, 2006, LNCS, V4117
[9]  
Cocks C., 2001, 8 IMA INT C CRYPT CO
[10]  
Cohen, 1993, COURSE COMPUTATIONAL, V8, DOI DOI 10.1007/978-3-662-02945-9