Skip to main content

2018 | OriginalPaper | Buchkapitel

The Public Verifiability of Public Key Encryption with Keyword Search

verfasst von : Binrui Zhu, Jiameng Sun, Jing Qin, Jixin Ma

Erschienen in: Mobile Networks and Management

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Cloud computing has been widely recognized as the next big thing in this era. Users outsourced data to cloud server and cloud server provided service economic savings and various convenience for users. Public key encryption with keyword search (PEKS) which provides a solution for a third party user to search on remote data encrypted by data owner. Since the server may be dishonest, it can perform search operation on encrypted data and only return partial results. Therefore, it is necessary to verify the correctness and completeness of the search result. Existing PEKS schemes only support data receiver’s private verification, however, in practice, we usually need anyone can verify the server’s search result. In this paper, we propose a PEKS with public verifiability scheme, which can achieve the security of ciphertext indistinguishability, trapdoor indistinguishability, keyword guessing attack and public verifiability. Comparing previous PEKS schemes, our scheme is public verifiability, while keeping the encrypted data security in cloud server and search operation privately over the encrypted data.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Song, D.X., Wagner, D., Perrig, A.: Practical techniques for searches on encrypted data. In: 2000 IEEE Symposium on Security and Privacy, pp. 44–55. IEEE Computer Society (2000) Song, D.X., Wagner, D., Perrig, A.: Practical techniques for searches on encrypted data. In: 2000 IEEE Symposium on Security and Privacy, pp. 44–55. IEEE Computer Society (2000)
2.
Zurück zum Zitat Goh, E.J.: Secure indexes. IACR Cryptol. ePrint Arch. 2003, 216 (2003) Goh, E.J.: Secure indexes. IACR Cryptol. ePrint Arch. 2003, 216 (2003)
3.
Zurück zum Zitat Reza, C., Garay, J., Kamara, S., Ostrovsky, R.: Searchable symmetric encryption: improved definition and efficient constructions. In: 2006 Proceedings of the 13th ACM Conference on Computer and Communications Security, pp. 79–88. ACM (2006) Reza, C., Garay, J., Kamara, S., Ostrovsky, R.: Searchable symmetric encryption: improved definition and efficient constructions. In: 2006 Proceedings of the 13th ACM Conference on Computer and Communications Security, pp. 79–88. ACM (2006)
8.
Zurück zum Zitat Abdalla, M., Bellare, M., Catalano, D., et al.: Searchable encryption revisited: consistency properties, relation to anonymous IBE, and extensions. J. Cryptol. 21(3), 350–391 (2008)MathSciNetCrossRef Abdalla, M., Bellare, M., Catalano, D., et al.: Searchable encryption revisited: consistency properties, relation to anonymous IBE, and extensions. J. Cryptol. 21(3), 350–391 (2008)MathSciNetCrossRef
9.
Zurück zum Zitat Chai, Q., Gong, G.: Verifiable symmetric searchable encryption for semi-honest-but-curious cloud servers. In: 2012 IEEE International Conference on Communications, pp. 917–922. IEEE (2012) Chai, Q., Gong, G.: Verifiable symmetric searchable encryption for semi-honest-but-curious cloud servers. In: 2012 IEEE International Conference on Communications, pp. 917–922. IEEE (2012)
10.
Zurück zum Zitat Wang, J., Ma, H., Tang, Q., et al.: Efficient verifiable fuzzy keyword search over encrypted data in cloud computing. Comput. Sci. Inf. Syst. 10(2), 667–684 (2013)CrossRef Wang, J., Ma, H., Tang, Q., et al.: Efficient verifiable fuzzy keyword search over encrypted data in cloud computing. Comput. Sci. Inf. Syst. 10(2), 667–684 (2013)CrossRef
11.
Zurück zum Zitat Zheng, Q., Xu, S., Ateniese, G.: VABKS: verifiable attribute-based keyword search over outsourced encrypted data. In: INFOCOM, 2014 Proceedings IEEE, pp. 522–530. IEEE (2014) Zheng, Q., Xu, S., Ateniese, G.: VABKS: verifiable attribute-based keyword search over outsourced encrypted data. In: INFOCOM, 2014 Proceedings IEEE, pp. 522–530. IEEE (2014)
12.
Zurück zum Zitat Liu, P., Wang, J., Ma, H., et al.: Efficient verifiable public key encryption with keyword search based on KP-ABE. In: 2014 Ninth International Conference on Broadband and Wireless Computing, Communication and Applications (BWCCA), pp. 584–589. IEEE (2014) Liu, P., Wang, J., Ma, H., et al.: Efficient verifiable public key encryption with keyword search based on KP-ABE. In: 2014 Ninth International Conference on Broadband and Wireless Computing, Communication and Applications (BWCCA), pp. 584–589. IEEE (2014)
13.
Zurück zum Zitat Wei, X., Zhang, H.: Verifiable multi-keyword fuzzy search over encrypted data in the cloud. In: 2016 International Conference on Advanced Materials and Information Technology Processing, pp. 271–277 (2016) Wei, X., Zhang, H.: Verifiable multi-keyword fuzzy search over encrypted data in the cloud. In: 2016 International Conference on Advanced Materials and Information Technology Processing, pp. 271–277 (2016)
17.
Zurück zum Zitat Zhang, R., Xue, R., Yu, T., et al.: PVSAE: a public verifiable searchable encryption service framework for outsourced encrypted data. In: 2016 IEEE International Conference on Web Services, pp. 428–435. IEEE (2016) Zhang, R., Xue, R., Yu, T., et al.: PVSAE: a public verifiable searchable encryption service framework for outsourced encrypted data. In: 2016 IEEE International Conference on Web Services, pp. 428–435. IEEE (2016)
18.
Zurück zum Zitat Goldreich, O.: Foundations of Cryptography. Cambridge University Press, Cambridge (2004)CrossRef Goldreich, O.: Foundations of Cryptography. Cambridge University Press, Cambridge (2004)CrossRef
19.
Zurück zum Zitat Rhee, H.S., Park, J.H., Susilo, W., et al.: Trapdoor security in a searchable public-key encryption scheme with a designated tester. J. Syst. Softw. 83(5), 763–771 (2010)CrossRef Rhee, H.S., Park, J.H., Susilo, W., et al.: Trapdoor security in a searchable public-key encryption scheme with a designated tester. J. Syst. Softw. 83(5), 763–771 (2010)CrossRef
20.
21.
Zurück zum Zitat Hao, Z., Zhong, S., Yu, N.: A privacy-preserving remote data integrity checking protocol with data dynamics and public verifiability. IEEE Trans. Knowl. Data Eng. 23(9), 1432–1437 (2011)CrossRef Hao, Z., Zhong, S., Yu, N.: A privacy-preserving remote data integrity checking protocol with data dynamics and public verifiability. IEEE Trans. Knowl. Data Eng. 23(9), 1432–1437 (2011)CrossRef
22.
Zurück zum Zitat Alabdulatif, A., Kumarage, H., Khalil, I., et al.: Privacy-preserving anomaly detection in cloud with a lightweight homomorphic approach. J. Comput. Syst. Sci. 90, 28–45 (2017)CrossRef Alabdulatif, A., Kumarage, H., Khalil, I., et al.: Privacy-preserving anomaly detection in cloud with a lightweight homomorphic approach. J. Comput. Syst. Sci. 90, 28–45 (2017)CrossRef
23.
Zurück zum Zitat Kumarage, H., Khalil, I., Alabdulatif, A., et al.: Secure data analytics for cloud-integrated internet of things applications. IEEE Cloud Comput. 3(2), 46–56 (2016)CrossRef Kumarage, H., Khalil, I., Alabdulatif, A., et al.: Secure data analytics for cloud-integrated internet of things applications. IEEE Cloud Comput. 3(2), 46–56 (2016)CrossRef
Metadaten
Titel
The Public Verifiability of Public Key Encryption with Keyword Search
verfasst von
Binrui Zhu
Jiameng Sun
Jing Qin
Jixin Ma
Copyright-Jahr
2018
DOI
https://doi.org/10.1007/978-3-319-90775-8_24