# A New Approach for Private Searches on Public-Key Encrypted Data

Abstract : Public-key Encryption with Keyword Search (PEKS) allows authorized users to search by keywords on encrypted data by generating trapdoors for the desired keywords. Basically there are two requirements for the process of trapdoors generation. On one hand, it is important to allow users to privately search on encrypted data without revealing keywords to the Trapdoor Generation Entity $\mathcal{TGE}$, and solutions proposed are based on the use of blinding protocols between user and $\mathcal{TGE}$. On the other hand, in some applications it is necessary to prevent $\mathcal{TGE}$ from generating trapdoors on behalf of a legitimate user, this is done by splitting the $\mathcal{TGE}$ and generating trapdoors in distributed manner. Until now, these two requirements in PEKS were considered separately and many solutions were proposed dealing with each one. However, no solution is known to satisfy the two requirements at the same time.In this paper we present a new approach to deal with this issue. First, we extend the notion of anonymous Identity-Based Encryption with distributed Private Key Generator to handle the blind key-extraction protocols as in Blind IBE. We call such new schemes blind anonymous (n,t)-IBE, and we give concrete construction of such schemes. Second, we generically transform the blind anonymous (n,t)-IBE into a threshold PEKS with oblivious keyword search satisfying the requirements specified above.
Keywords :
Document type :
Conference papers
Domain :

Cited literature [25 references]

https://hal.inria.fr/hal-01540893
Contributor : Hal Ifip <>
Submitted on : Friday, June 16, 2017 - 4:47:04 PM
Last modification on : Wednesday, May 23, 2018 - 1:19:50 AM
Long-term archiving on : Wednesday, January 10, 2018 - 1:50:19 PM

### File

978-3-642-32805-3_13_Chapter.p...
Files produced by the author(s)

### Citation

Amar Siad. A New Approach for Private Searches on Public-Key Encrypted Data. 13th International Conference on Communications and Multimedia Security (CMS), Sep 2012, Canterbury, United Kingdom. pp.160-173, ⟨10.1007/978-3-642-32805-3_13⟩. ⟨hal-01540893⟩

Record views