Searchable Public Key Encryption Based on RSA Assumption and Extended to Multi-user Setting

نویسندگان

  • Wenjun Luo
  • Xiaofang Zhang
  • Jianming Tan
چکیده

In this paper, we study the problem of keyword searches over asymmetrically encrypted data. Our scheme is based on strong RSA assumption, which provides the high efficient search technique and is proven secure in the standard model. In comparison with previous schemes, our scheme requires only simpler computation without pairing operation, and lower storage overheads on servers and clients. Moreover, most servers are not only about to serve for single user, but to support query and search operations for multiple users. As a result, we extend our scheme to multiuser environment, which provides an efficient search scheme of remote storage for a number of users. Furthermore, we define the secure model for mPEKS scheme and prove the security and availability of our scheme.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Expressive and Secure Searchable Encryption in the Public Key Setting

Searchable encryption allows an untrusted server to search on encrypted data without knowing the underlying data contents. Traditional searchable encryption schemes focus only on single keyword or conjunctive keyword search. Several solutions have been recently proposed to design more expressive search criteria, but most of them are in the setting of symmetric key encryption. In this paper, bas...

متن کامل

Public-Key Encryption in a Multi-user Setting: Security Proofs and Improvements

This paper addresses the security of public-key cryptosystems in a \multi-user" setting, namely in the presence of attacks involving the encryption of related messages under di erent public keys, as exempli ed by H astad's classical attacks on RSA. We prove that security in the single-user setting implies security in the multi-user setting as long as the former is interpreted in the strong sens...

متن کامل

Browse searchable encryption schemes: Classification, methods and recent developments

With the advent of cloud computing, data owners tend to submit their data to cloud servers and allow users to access data when needed. However, outsourcing sensitive data will lead to privacy issues. Encrypting data before outsourcing solves privacy issues, but in this case, we will lose the ability to search the data. Searchable encryption (SE) schemes have been proposed to achieve this featur...

متن کامل

Fuzzy retrieval of encrypted data by multi-purpose data-structures

The growing amount of information that has arisen from emerging technologies has caused organizations to face challenges in maintaining and managing their information. Expanding hardware, human resources, outsourcing data management, and maintenance an external organization in the form of cloud storage services, are two common approaches to overcome these challenges; The first approach costs of...

متن کامل

QTRU: quaternionic version of the NTRU public-key cryptosystems

In this paper we will construct a lattice-based public-key cryptosystem using non-commutative quaternion algebra, and since its lattice does not fully fit within Circular and Convolutional Modular Lattice (CCML), we prove it is arguably more secure than the existing lattice-based cryptosystems such as NTRU. As in NTRU, the proposed public-key cryptosystem relies for its inherent securi...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013