Provably secure public-key encryption with conjunctive and subset keyword search

被引:17
作者
Farras, Oriol [1 ]
Ribes-Gonzalez, Jordi [1 ]
机构
[1] Univ Rovira & Virgili, Av Paisos Catalans 26, E-43007 Tarragona, Catalonia, Spain
基金
欧盟地平线“2020”;
关键词
Searchable encryption; Conjunctive keyword search; Subset keyword search; Public-key encryption with keyword search; IDENTITY-BASED ENCRYPTION; ATTACKS;
D O I
10.1007/s10207-018-00426-7
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Public-key encryption with keyword search (PEKS) schemes enable public key holders to encrypt documents, while the secret key holder is able to generate queries for the encrypted data. In this paper, we present two PEKS schemes with extended functionalities. The first proposed scheme supports conjunctive queries. That is, it enables searching for encrypted documents containing a chosen list of keywords. We prove the computational consistency of our scheme, and we prove security under the asymmetric DBDH assumption. We show that it improves previous related schemes in terms of efficiency and in terms of index and trapdoor size. The second proposed scheme supports subset queries and some more general predicates. We prove the computational consistency of our scheme, and we prove our scheme secure under the p-BDHI assumption. We show that it improves previous related schemes in terms of efficiency and expressiveness. Moreover, unlike previous related schemes, it admits an arbitrary keyword space.
引用
收藏
页码:533 / 548
页数:16
相关论文
共 41 条
[1]  
Abdalla M, 2005, LECT NOTES COMPUT SC, V3621, P205
[2]  
[Anonymous], 1993, ACM CCS 1993, DOI DOI 10.1145/168588.168596
[3]  
[Anonymous], ACM COMPUTING SURVEY
[4]   The Realm of the Pairings [J].
Aranha, Diego F. ;
Barreto, Paulo S. L. M. ;
Longa, Patrick ;
Ricardini, Jefferson E. .
SELECTED AREAS IN CRYPTOGRAPHY - SAC 2013, 2014, 8282 :3-25
[5]  
Baek J, 2008, LECT NOTES COMPUT SC, V5072, P1249, DOI 10.1007/978-3-540-69839-5_96
[6]  
Ballard L, 2005, LECT NOTES COMPUT SC, V3783, P414
[7]  
Barbulescu R, 2014, LECT NOTES COMPUT SC, V8441, P1, DOI 10.1007/978-3-642-55220-5_1
[8]  
Barreto PSLM, 2002, LECT NOTES COMPUT SC, V2442, P354
[9]  
Boneh D, 2004, LECT NOTES COMPUT SC, V3027, P506
[10]   Identity-based encryption from the Weil pairing [J].
Boneh, D ;
Franklin, M .
SIAM JOURNAL ON COMPUTING, 2003, 32 (03) :586-615