A new approach for private searches on public-key encrypted data

作者: Amar Siad

DOI: 10.1007/978-3-642-32805-3_13

关键词:

摘要: Public-key Encryption with Keyword Search (PEKS) allows authorized users to search by keywords on encrypted data generating trapdoors for the desired keywords. Basically there are two requirements process of generation. On one hand, it is important allow privately without revealing Trapdoor Generation Entity $\mathcal{TGE}$, and solutions proposed based use blinding protocols between user $\mathcal{TGE}$. other in some applications necessary prevent $\mathcal{TGE}$ from behalf a legitimate user, this done splitting distributed manner. Until now, these PEKS were considered separately many dealing each one. However, no solution known satisfy at same time. In paper we present new approach deal issue. First, extend notion anonymous Identity-Based Private Key Generator handle blind key-extraction as Blind IBE. We call such schemes (n,t)-IBE, give concrete construction schemes. Second, generically transform (n,t)-IBE into threshold oblivious keyword satisfying specified above.

参考文章(42)
Matthew Green, Susan Hohenberger, Blind identity-based encryption and simulatable oblivious transfer international conference on the theory and application of cryptology and information security. pp. 265- 282 ,(2007) , 10.1007/978-3-540-76900-2_16
Diana K. Smetters, Brent R. Waters, Dirk Balfanz, Glenn Durfee, Building an Encrypted and Searchable Audit Log. network and distributed system security symposium. ,(2004)
Public Key Cryptography - PKC 2009 Lecture Notes in Computer Science. ,vol. 5443, ,(2009) , 10.1007/978-3-642-00468-1
Aggelos Kiayias, Moti Yung, Self Protecting Pirates and Black-Box Traitor Tracing international cryptology conference. pp. 63- 79 ,(2001) , 10.1007/3-540-44647-8_4
R. Canetti, Universally composable security: a new paradigm for cryptographic protocols international conference on cluster computing. pp. 136- 145 ,(2001) , 10.1109/SFCS.2001.959888
Martin Geisler, Nigel P. Smart, Distributing the Key Distribution Centre in Sakai---Kasahara Based Systems Cryptography and Coding '09 Proceedings of the 12th IMA International Conference on Cryptography and Coding. pp. 252- 262 ,(2009) , 10.1007/978-3-642-10868-6_15
Craig Gentry, Practical Identity-Based Encryption Without Random Oracles Advances in Cryptology - EUROCRYPT 2006. pp. 445- 464 ,(2006) , 10.1007/11761679_27
Sherman S. M. Chow, Removing Escrow from Identity-Based Encryption Public Key Cryptography – PKC 2009. pp. 256- 276 ,(2009) , 10.1007/978-3-642-00468-1_15
Matthew Hennessy, Robin Milner, On Observing Nondeterminism and Concurrency international colloquium on automata, languages and programming. pp. 299- 309 ,(1980) , 10.1007/3-540-10003-2_79
Michel Abdalla, Xavier Boyen, Céline Chevalier, David Pointcheval, Distributed Public-Key Cryptography from Weak Secrets Public Key Cryptography – PKC 2009. ,vol. 5443, pp. 139- 159 ,(2009) , 10.1007/978-3-642-00468-1_9