Searchable Public Key Encryption Based on RSA Assumption and Extended to Multi-user Setting
نویسندگان
چکیده
In this paper, we study the problem of keyword searches over asymmetrically encrypted data. Our scheme is based on strong RSA assumption, which provides the high efficient search technique and is proven secure in the standard model. In comparison with previous schemes, our scheme requires only simpler computation without pairing operation, and lower storage overheads on servers and clients. Moreover, most servers are not only about to serve for single user, but to support query and search operations for multiple users. As a result, we extend our scheme to multiuser environment, which provides an efficient search scheme of remote storage for a number of users. Furthermore, we define the secure model for mPEKS scheme and prove the security and availability of our scheme.
منابع مشابه
Expressive and Secure Searchable Encryption in the Public Key Setting
Searchable encryption allows an untrusted server to search on encrypted data without knowing the underlying data contents. Traditional searchable encryption schemes focus only on single keyword or conjunctive keyword search. Several solutions have been recently proposed to design more expressive search criteria, but most of them are in the setting of symmetric key encryption. In this paper, bas...
متن کاملPublic-Key Encryption in a Multi-user Setting: Security Proofs and Improvements
This paper addresses the security of public-key cryptosystems in a \multi-user" setting, namely in the presence of attacks involving the encryption of related messages under di erent public keys, as exempli ed by H astad's classical attacks on RSA. We prove that security in the single-user setting implies security in the multi-user setting as long as the former is interpreted in the strong sens...
متن کاملBrowse searchable encryption schemes: Classification, methods and recent developments
With the advent of cloud computing, data owners tend to submit their data to cloud servers and allow users to access data when needed. However, outsourcing sensitive data will lead to privacy issues. Encrypting data before outsourcing solves privacy issues, but in this case, we will lose the ability to search the data. Searchable encryption (SE) schemes have been proposed to achieve this featur...
متن کاملFuzzy retrieval of encrypted data by multi-purpose data-structures
The growing amount of information that has arisen from emerging technologies has caused organizations to face challenges in maintaining and managing their information. Expanding hardware, human resources, outsourcing data management, and maintenance an external organization in the form of cloud storage services, are two common approaches to overcome these challenges; The first approach costs of...
متن کاملQTRU: quaternionic version of the NTRU public-key cryptosystems
In this paper we will construct a lattice-based public-key cryptosystem using non-commutative quaternion algebra, and since its lattice does not fully fit within Circular and Convolutional Modular Lattice (CCML), we prove it is arguably more secure than the existing lattice-based cryptosystems such as NTRU. As in NTRU, the proposed public-key cryptosystem relies for its inherent securi...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2013