Expressive Search on Encrypted Data

Different from the traditional public key encryption, searchable public key encryption allows a data owner to encrypt his data under a user’s public key in such a way that the user can generate search token keys using her secret key and then query an encryption storage server. On receiving such a se...

Full description

Saved in:
Bibliographic Details
Main Authors: LAI, Junzuo, ZHOU, Xuhua, DENG, Robert H., LI, Yingjiu, CHEN, Kefei
Format: text
Language:English
Published: Institutional Knowledge at Singapore Management University 2013
Subjects:
Online Access:https://ink.library.smu.edu.sg/sis_research/1945
https://ink.library.smu.edu.sg/context/sis_research/article/2944/viewcontent/p243_lai.pdf
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Singapore Management University
Language: English
id sg-smu-ink.sis_research-2944
record_format dspace
spelling sg-smu-ink.sis_research-29442015-12-20T08:07:49Z Expressive Search on Encrypted Data LAI, Junzuo ZHOU, Xuhua DENG, Robert H. LI, Yingjiu CHEN, Kefei Different from the traditional public key encryption, searchable public key encryption allows a data owner to encrypt his data under a user’s public key in such a way that the user can generate search token keys using her secret key and then query an encryption storage server. On receiving such a search token key, the server filters all or related stored encryptions and returns matched ones as response. Searchable pubic key encryption has many promising applications. Unfortunately, existing schemes either only support simple query predicates, such as equality queries and conjunctive queries, or have a superpolynomial blowup in ciphertext size and search token key size. In this paper, based on the key-policy attribute-based encryption scheme proposed by Lewko et al. recently, we present a new construction of searchable public key encryption. Compared to previous works in this field, our construction is much more expressive and efficient and is proven secure in the standard model. 2013-05-01T07:00:00Z text application/pdf https://ink.library.smu.edu.sg/sis_research/1945 info:doi/10.1145/2484313.2484345 https://ink.library.smu.edu.sg/context/sis_research/article/2944/viewcontent/p243_lai.pdf http://creativecommons.org/licenses/by-nc-nd/4.0/ Research Collection School Of Computing and Information Systems eng Institutional Knowledge at Singapore Management University Searchable Public Key Encryption Public Key Encryption with Keyword Search Anonymous Key-Policy Attribute-Based Encryption Information Security
institution Singapore Management University
building SMU Libraries
continent Asia
country Singapore
Singapore
content_provider SMU Libraries
collection InK@SMU
language English
topic Searchable Public Key Encryption
Public Key Encryption with Keyword Search
Anonymous Key-Policy Attribute-Based Encryption
Information Security
spellingShingle Searchable Public Key Encryption
Public Key Encryption with Keyword Search
Anonymous Key-Policy Attribute-Based Encryption
Information Security
LAI, Junzuo
ZHOU, Xuhua
DENG, Robert H.
LI, Yingjiu
CHEN, Kefei
Expressive Search on Encrypted Data
description Different from the traditional public key encryption, searchable public key encryption allows a data owner to encrypt his data under a user’s public key in such a way that the user can generate search token keys using her secret key and then query an encryption storage server. On receiving such a search token key, the server filters all or related stored encryptions and returns matched ones as response. Searchable pubic key encryption has many promising applications. Unfortunately, existing schemes either only support simple query predicates, such as equality queries and conjunctive queries, or have a superpolynomial blowup in ciphertext size and search token key size. In this paper, based on the key-policy attribute-based encryption scheme proposed by Lewko et al. recently, we present a new construction of searchable public key encryption. Compared to previous works in this field, our construction is much more expressive and efficient and is proven secure in the standard model.
format text
author LAI, Junzuo
ZHOU, Xuhua
DENG, Robert H.
LI, Yingjiu
CHEN, Kefei
author_facet LAI, Junzuo
ZHOU, Xuhua
DENG, Robert H.
LI, Yingjiu
CHEN, Kefei
author_sort LAI, Junzuo
title Expressive Search on Encrypted Data
title_short Expressive Search on Encrypted Data
title_full Expressive Search on Encrypted Data
title_fullStr Expressive Search on Encrypted Data
title_full_unstemmed Expressive Search on Encrypted Data
title_sort expressive search on encrypted data
publisher Institutional Knowledge at Singapore Management University
publishDate 2013
url https://ink.library.smu.edu.sg/sis_research/1945
https://ink.library.smu.edu.sg/context/sis_research/article/2944/viewcontent/p243_lai.pdf
_version_ 1770571693764378624