Efficient searchable ID-based encryption with a designated server

被引:49
作者
Wu, Tsu-Yang [1 ,2 ]
Tsai, Tung-Tso [3 ]
Tseng, Yuh-Min [3 ]
机构
[1] Harbin Inst Technol, Shenzhen Grad Sch, Innovat Informat Ind Res Ctr, Shenzhen 518055, Peoples R China
[2] Shenzhen Key Lab Internet Informat Collaborat, Shenzhen 518055, Peoples R China
[3] Natl Changhua Univ Educ, Dept Math, Changhua City 500, Peoples R China
关键词
Searchable public key encryption; Designated server; Identity-based; Bilinear pairings; KEY EXCHANGE PROTOCOL; IDENTITY-BASED ENCRYPTION; KEYWORD SEARCH; USER AUTHENTICATION; AGREEMENT; SIGNATURE; SECURITY; SCHEME; RESISTANT;
D O I
10.1007/s12243-013-0398-z
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Public key encryption with keyword search (PEKS) is a mechanism that allows one to extract e-mails containing a particular keyword by providing a trapdoor corresponding to the keyword. And parties without the trapdoor are unable to learn any information about the extracted e-mails. Meanwhile, a PEKS scheme is also suitable to provide a secure storage system in cloud computing environment. However, in a PEKS scheme, a secure channel must be established to transmit trapdoors. A PEKS scheme with a designated server, termed dPEKS, removes the requirement of the secure channel while retaining the same functionality of PEKS. Up to date, the related studies on dPEKS are all based on the pairing-based public key system. No work focuses on dPEKS based on ID-based systems, termed dIBEKS. In this article, we propose the first dIBEKS scheme that possesses the advantage (removing certificate management) of ID-based systems. Security analysis is given to demonstrate that our scheme is provably secure and can resist off-line keyword guessing attacks. When compared with previously proposed dPEKS schemes, our scheme has better performance in terms of computational time.
引用
收藏
页码:391 / 402
页数:12
相关论文
共 33 条
[1]  
Abdalla M, 2005, LECT NOTES COMPUT SC, V3621, P205
[2]  
[Anonymous], 1993, ACM CCS 1993, DOI DOI 10.1145/168588.168596
[3]  
Baek J, 2008, LECT NOTES COMPUT SC, V5072, P1249, DOI 10.1007/978-3-540-69839-5_96
[4]  
Bellare M, 2004, LECT NOTES COMPUT SC, V3027, P268
[5]  
Boneh D, 2004, LECT NOTES COMPUT SC, V3027, P506
[6]   Identity-based encryption from the Weil pairing [J].
Boneh, D ;
Franklin, M .
SIAM JOURNAL ON COMPUTING, 2003, 32 (03) :586-615
[7]  
Boneh D, 2008, LECT NOTES COMPUT SC, V5350, P455, DOI 10.1007/978-3-540-89255-7_28
[8]  
Byun JW, 2006, LECT NOTES COMPUT SC, V4165, P75
[9]   The random oracle methodology, revisited [J].
Canetti, R ;
Goldreich, O ;
Halevi, S .
JOURNAL OF THE ACM, 2004, 51 (04) :557-594
[10]  
Cha JC, 2003, LECT NOTES COMPUT SC, V2567, P18