Compiler for trapdoor security in searchable public key encryption with designated verifiers
نویسندگان
چکیده
The offline keyword guessing attack (KG attack) is a new security threat to the searchable public key encryption with designated verifier. Many techniques have been proposed to resist such an attack. However, all these techniques are only secure against the outside KG attackers (neither the server nor the receiver), and have not solved the problem that the KG attacker is the server. In this paper, we propose the IND-KGA-SERVER security which is a security model against the server for searchable public key encryption and is a necessary supplement to the security against KG attacks. Then based on the existence of IND-KGA secure dPEKS, the existence of CA, and the existence of strongly unforgeable and undeniable signatures, we demonstrate how to construct secure searchable public key encryptions when KG attacker is the server. Our solution is independent of the based IND-KGA secure scheme and is a compiler from IND-KGA security to INDKGA-SERVER security for searchable public key encryptions with designated verifier.
منابع مشابه
Decryptable Searchable Encryption
As such, public-key encryption with keyword search (a.k.a PEKS or searchable encryption) does not allow the recipient to decrypt keywords i.e. encryption is not invertible. This paper introduces searchable encryption schemes which enable decryption. An additional feature is that the decryption key and the trapdoor derivation key are totally independent, thereby complying with many contexts of a...
متن کاملBrowse searchable encryption schemes: Classification, methods and recent developments
With the advent of cloud computing, data owners tend to submit their data to cloud servers and allow users to access data when needed. However, outsourcing sensitive data will lead to privacy issues. Encrypting data before outsourcing solves privacy issues, but in this case, we will lose the ability to search the data. Searchable encryption (SE) schemes have been proposed to achieve this featur...
متن کاملDynamic Searchable Public-Key Ciphertexts with Fast Performance and Practical Security
Public-key encryption with keyword search (PEKS) allows a sender to generate keyword-searchable ciphertexts using a receiver’s public key and upload them to a server. Upon receiving a keyword-search trapdoor from the receiver, the server finds all matching ciphertexts. Due to the characteristics of public-key encryption, PEKS is inherently suitable for the application of numerous senders. Hence...
متن کاملTrapdoor Privacy in Asymmetric Searchable Encryption Schemes
Asymmetric searchable encryption allows searches to be carried over ciphertexts, through delegation, and by means of trapdoors issued by the owner of the data. Public Key Encryption with Keyword Search (PEKS) is a primitive with such functionality that provides delegation of exact-match searches. As it is important that ciphertexts preserve data privacy, it is also important that trapdoors do n...
متن کاملSurvey on Searchable Public-key Cipher Texts for Privacy Preserving Keyword Search
The Public Key Encryption along with Keyword Search allows one to search the data that is in encrypted form with a keyword without showing any information. This paper gives the detail study on searchable Public-Key Ciphertexts with Hidden Structures (SPCHS) that fastenthe keyword search without sacrificing the security of encrypted keywords. In SPCHS, the keyword ciphertexts is structured by hi...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2014