Autosoft Journal

Online Manuscript Access


Multi-Key Searchable Encryption with Designated Server


Authors



Abstract

This paper presents a novel multi-key searchable encryption with designated server based on the RA Popa2019s multi-key searchable encryption and Rhee2019s PEKS. As far as we know, it is the first multi-key searchable encryption based on asymmetric cryptographic approach. One advantage of our proposed scheme is that it allows a user to provide a single trapdoor to the server, though it allows the designated server to search for that trapdoor2019s word in documents encrypted with different keys. Another advantage of our scheme is that only the designated server can identify whether a trapdoor matches the encrypted data or not.


Keywords


Pages

Total Pages: 7
Pages: 295-301

DOI
10.1080/10798587.2015.1095476


Manuscript ViewPdf Subscription required to access this document

Obtain access this manuscript in one of the following ways


Already subscribed?

Need information on obtaining a subscription? Personal and institutional subscriptions are available.

Already an author? Have access via email address?


Published

Volume: 22
Issue: 2
Year: 2015

Cite this document


References

Baek, Joonsang, Reihaneh Safavi-Naini, and Willy Susilo. "Public Key Encryption with Keyword Search Revisited." Lecture Notes in Computer Science 1249-1259. Crossref. Web. https://doi.org/10.1007/978-3-540-69839-5_96

Chen, Chin-Ling et al. "Designing A Healthcare Authorization Model Based On Cloud Authentication." Intelligent Automation & Soft Computing 20.3 (2014): 365-379. Crossref. Web. https://doi.org/10.1080/10798587.2014.888243

Dong, Qiuxiang et al. "Fuzzy Keyword Search over Encrypted Data in the Public Key Setting." Lecture Notes in Computer Science (2013): 729-740. Crossref. Web. https://doi.org/10.1007/978-3-642-38562-9_74

Emura, Keita, Atsuko Miyaji, and Kazumasa Omote. "Adaptive Secure-Channel Free Public-Key Encryption with Keyword Search Implies Timed Release Encryption." Information Security (2011): 102-118. Crossref. Web. https://doi.org/10.1007/978-3-642-24861-0_8

Fang, Liming et al. "A Secure Channel Free Public Key Encryption with Keyword Search Scheme Without Random Oracle." Lecture Notes in Computer Science (2009): 248-258. Crossref. Web. https://doi.org/10.1007/978-3-642-10433-6_16

Feng, Yansheng, Hua Ma, and Xiaofeng Chen. "Efficient and Verifiable Outsourcing Scheme of Sequence Comparisons." Intelligent Automation & Soft Computing 21.1 (2014): 51-63. Crossref. Web. https://doi.org/10.1080/10798587.2014.915109

Hu, Chengyu, Peng He, and Pengtao Liu. "Public Key Encryption with Multi-Keyword Search." Network Computing and Information Security (2012): 568-576. Crossref. Web. https://doi.org/10.1007/978-3-642-35211-9_72

Hu, Chengyu, and Pengtao Liu. "A Secure Searchable Public Key Encryption Scheme with a Designated Tester Against Keyword Guessing Attacks and Its Extension." Communications in Computer and Information Science (2011): 131-136. Crossref. Web. https://doi.org/10.1007/978-3-642-23324-1_23

Hwang, Yong Ho, and Pil Joong Lee. "Public Key Encryption with Conjunctive Keyword Search and Its Extension to a Multi-User System." Lecture Notes in Computer Science 2-22. Crossref. Web. https://doi.org/10.1007/978-3-540-73489-5_2

Popa R. A. IACR Cryptology ePrint Archive

Rhee, Hyun Sook, Jong Hwan Park, and Dong Hoon Lee. "Generic Construction of Designated Tester Public-Key Encryption with Keyword Search." Information Sciences 205 (2012): 93-109. Crossref. Web. https://doi.org/10.1016/j.ins.2012.03.020

Rhee, Hyun Sook et al. "Trapdoor Security in a Searchable Public-Key Encryption Scheme with a Designated Tester." Journal of Systems and Software 83.5 (2010): 763-771. Crossref. Web. https://doi.org/10.1016/j.jss.2009.11.726

Rhee, Hyun Sook, Willy Susilo, and Hyun-Jeong Kim. "Secure Searchable Public Key Encryption Scheme Against Keyword Guessing Attacks." IEICE Electronics Express 6.5 (2009): 237-243. Crossref. Web. https://doi.org/10.1587/elex.6.237

Wu, Tsu-Yang, Tung-Tso Tsai, and Yuh-Min Tseng. "Efficient Searchable ID-Based Encryption with a Designated Server." annals of telecommunications - annales des télécommunications 69.7-8 (2013): 391-402. Crossref. Web. https://doi.org/10.1007/s12243-013-0398-z

Yau, Wei-Chuen et al. "Keyword Guessing Attacks on Secure Searchable Public Key Encryption Schemes with a Designated Tester." International Journal of Computer Mathematics 90.12 (2013): 2581-2587. Crossref. Web. https://doi.org/10.1080/00207160.2013.778985

JOURNAL INFORMATION


ISSN PRINT: 1079-8587
ISSN ONLINE: 2326-005X
DOI PREFIX: 10.31209
10.1080/10798587 with T&F
IMPACT FACTOR: 0.652 (2017/2018)
Journal: 1995-Present




CONTACT INFORMATION


TSI Press
18015 Bullis Hill
San Antonio, TX 78258 USA
PH: 210 479 1022
FAX: 210 479 1048
EMAIL: tsiepress@gmail.com
WEB: http://www.wacong.org/tsi/