Advanced Searchable Encryption: Keyword Search for Matrix-type Storage

被引:0
作者
Kodera, Yuta [1 ]
Kuribayashi, Minoru [1 ]
Kusaka, Takuya [1 ]
Nogami, Yasuyuki [1 ]
机构
[1] Okayama Univ, Grad Sch Nat Sci & Technol, Okayama, Japan
来源
2018 SIXTH INTERNATIONAL SYMPOSIUM ON COMPUTING AND NETWORKING WORKSHOPS (CANDARW 2018) | 2018年
关键词
searchable symmetric encryption; block cipher; matrix-type data; location-based search; PUBLIC-KEY ENCRYPTION;
D O I
10.1109/CANDARW.2018.00061
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The recent development of IoT technologies and cloud storages, many types of information including private information have been gradually outsourced. For such a situation, new convenient functionalities such as arithmetic and keyword search on ciphertexts are required to allow users to retrieve information without leaking any information. Especially, searchable encryptions have been paid much attention to realize a keyword search on an encrypted domain. In addition, an architecture of searchable symmetric encryption (SSE) is a suitable and efficient solution for data outsourcing. In this paper, we focus on an SSE scheme which employs a secure index for searching a keyword with optimal search time. In the conventional studies, it has been widely considered that the scheme searches whether a queried keyword is contained in encrypted documents. On the other hand, we additionally take into account the location of a queried keyword in documents by targeting a matrix-type data format. It enables a manager to search personal information listed per line or column in CSV-like format data.
引用
收藏
页码:292 / 297
页数:6
相关论文
共 16 条
[1]  
[Anonymous], 2003, SECURE INDEXES
[2]  
[Anonymous], 2002, DESIGN RIJNDAEL, DOI DOI 10.1007/978-3-662-04722-4
[3]  
Baek J, 2008, LECT NOTES COMPUT SC, V5072, P1249, DOI 10.1007/978-3-540-69839-5_96
[4]  
Boneh D, 2004, LECT NOTES COMPUT SC, V3027, P506
[5]   A Survey of Provably Secure Searchable Encryption [J].
Bosch, Christoph ;
Hartel, Pieter ;
Jonker, Willem ;
Peter, Andreas .
ACM COMPUTING SURVEYS, 2015, 47 (02)
[6]  
Chang YC, 2005, LECT NOTES COMPUT SC, V3531, P442
[7]   Searchable symmetric encryption: Improved definitions and efficient constructions [J].
Curtmola, Reza ;
Garay, Juan ;
Kamara, Seny ;
Ostrovsky, Rafail .
JOURNAL OF COMPUTER SECURITY, 2011, 19 (05) :895-934
[8]   A one round protocol for tripartite Diffie-Hellman [J].
Joux, A .
JOURNAL OF CRYPTOLOGY, 2004, 17 (04) :263-276
[9]  
Kamara S, 2012, P ACM SIGSAC C COMP, P965
[10]  
Kurosawa K., 2012, Financial Cryptography and Data Security (FC '12), Lecture Notes in Computer Science, P285