Searchable Encryption with Keyword-Recoverability
スポンサーリンク
概要
- 論文の詳細を見る
Searchable encryption has many applications including e-mail systems and storage systems. The usefulness of searchable encryption derives from its support of keyword-testability. Keyword-testability means that a receiver of a ciphertext can test whether the ciphertext contains a specific keyword. Recently, Bellare et al. suggested an efficiently-searchable encryption scheme with keyword-recoverability as well as keyword-testability. Keyword-recoverability means that a receiver can extract the keyword from a ciphertext. All of the previous searchable encryption schemes have provided only keyword-testability. However, as explained by Bellare et al., no efficiently-searchable encryption scheme can provide even security against chosen keyword attacks. That is, Bellare et al.s scheme assumes that no useful partial information about the keyword is known to the adversaries. In this paper, we suggest an SEKR (searchable encryption with keyword-recoverability) scheme which is secure even if the adversaries have any useful partial information about the keyword. Our scheme provides security against chosen ciphertext attacks which are stronger attacks than chosen keyword attacks. We also suggest an SEKR scheme for multi-keywords.
- 2009-05-01
著者
-
Lee Dong
Graduate School of Information Management & Security, CIST, Korea University
-
Lee Dong
Etri (electronics And Telecommunications Research Institute)
-
Kwon Jeong
Information Security Group Samsung Sds
-
Lee Dong
Graduate School Of Information & Communication Ajou University
-
JEONG Ik
Graduate School of Information Management & Security, CIST, Korea University
-
HONG Dowon
ETRI (Electronics and Telecommunications Research Institute)
-
Jeong Ik
Graduate School Of Information Management & Security Cist Korea University
関連論文
- RFID tag search protocol preserving privacy of mobile reader holders
- Password-Authenticated Key Exchange for Multi-Party with Different Passwords Using a Constant Number of Rounds
- Password-Authenticated Key Exchange for Multi-Party with Different Passwords Using a Constant Number of Rounds
- Password-Authenticated Key Exchange for Multi-Party with Different Passwords Using a Constant Number of Rounds
- Analysis of Hu-Huang-Fan Practical Hierarchical Identity-Based Encryption Scheme
- Stronger Chikazawa-Yamagishi ID-Based Key Distribution
- Searchable Encryption with Keyword-Recoverability
- SSR (Smart Sleep Recognizer): Making Decision Based on Probability of User's Intension (日韓合同ワークショップ 1st Korea-Japan Joint Workshop on Ubiquitous Computing and Networking Systems (ubiCNS 2005))
- Change of Rotated Cube Texture through Multi-processing in 3% Si-steels
- Collusion Attacks to Tanaka's Corrected ID-Based Non-interactive Key Sharing Scheme
- Analysis of Revocable-iff-Linked Ring Signature Scheme
- Strong ID-Based Key Distribution
- Three-Round Smart Card-Based Key Exchange Scheme(Fundamental Theories for Communications)
- On the Strong Forward Secrecy of the Improved Chikazawa-Yamagishi ID-Based Key Sharing(Information Security)
- Ultimate Longitudinal Strength-Based Safety and Reliability Assessment of a Ship′s Hull Girder〔付 討論〕
- Incompletely Condensed Silsesquioxanes : Formation and Reactivity
- A Hidden Vector Encryption Scheme with Constant-Size Tokens and Pairing Computations
- Scalable Privacy-Preserving t-Repetition Protocol with Distributed Medical Data
- Transmission-Efficient Broadcast Encryption Scheme with Personalized Messages