A New General Framework for Secure Public Key Encryption with Keyword Search

被引:51
作者
Chen, Rongmao [1 ,2 ]
Mu, Yi [1 ]
Yang, Guomin [1 ]
Guo, Fuchun [1 ]
Wang, Xiaofen [1 ,3 ]
机构
[1] Univ Wollongong, Sch Comp & Informat Technol, Ctr Comp & Informat Secur Res, Wollongong, NSW, Australia
[2] Natl Univ Def Technol, Coll Comp, Changsha, Hunan, Peoples R China
[3] Univ Elect Sci & Technol China, Dept Comp Sci & Engn, Chengdu 610054, Peoples R China
来源
INFORMATION SECURITY AND PRIVACY (ACISP 2015) | 2015年 / 9144卷
关键词
Dual-server public key encryption with keyword search; Smooth projective hash function; GUESSING ATTACKS; SCHEMES;
D O I
10.1007/978-3-319-19962-7_4
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Public Key Encryption with Keyword Search (PEKS), introduced by Boneh et al. in Eurocrypt' 04, allows users to search encrypted documents on an untrusted server without revealing any information. This notion is very useful in many applications and has attracted a lot of attention by the cryptographic research community. However, one limitation of all the existing PEKS schemes is that they cannot resist the Keyword Guessing Attack (KGA) launched by a malicious server. In this paper, we propose a new PEKS framework named Dual-Server Public Key Encryption with Keyword Search (DS-PEKS). This new framework can withstand all the attacks, including the KGA from the two untrusted servers, as long as they do not collude. We then present a generic construction of DS-PEKS using a new variant of the Smooth Projective Hash Functions (SPHFs), which is of independent interest.
引用
收藏
页码:59 / 76
页数:18
相关论文
共 23 条
[1]  
Abdalla M, 2005, LECT NOTES COMPUT SC, V3621, P205
[2]  
Abdalla M, 2013, LECT NOTES COMPUT SC, V8269, P214, DOI 10.1007/978-3-642-42033-7_12
[3]  
Abdalla M, 2009, LECT NOTES COMPUT SC, V5677, P671, DOI 10.1007/978-3-642-03356-8_39
[4]  
Baek J, 2008, LECT NOTES COMPUT SC, V5072, P1249, DOI 10.1007/978-3-540-69839-5_96
[5]  
Baek J, 2006, LECT NOTES COMPUT SC, V4176, P217
[6]  
Ben Hamouda F., 2013, IACR CRYPTOLOGY EPRI, V2013, P34
[7]  
Ben Hamouda F, 2013, LECT NOTES COMPUT SC, V7778, P272, DOI 10.1007/978-3-642-36362-7_18
[8]  
Benhamouda F, 2013, LECT NOTES COMPUT SC, V8042, P449, DOI 10.1007/978-3-642-40041-4_25
[9]  
Blazy O, 2012, LECT NOTES COMPUT SC, V7194, P94, DOI 10.1007/978-3-642-28914-9_6
[10]  
Boneh D, 2004, LECT NOTES COMPUT SC, V3027, P506