A New Approach for Private Searches on Public-Key Encrypted Data

Abstract : Public-key Encryption with Keyword Search (PEKS) allows authorized users to search by keywords on encrypted data by generating trapdoors for the desired keywords. Basically there are two requirements for the process of trapdoors generation. On one hand, it is important to allow users to privately search on encrypted data without revealing keywords to the Trapdoor Generation Entity $\mathcal{TGE}$, and solutions proposed are based on the use of blinding protocols between user and $\mathcal{TGE}$. On the other hand, in some applications it is necessary to prevent $\mathcal{TGE}$ from generating trapdoors on behalf of a legitimate user, this is done by splitting the $\mathcal{TGE}$ and generating trapdoors in distributed manner. Until now, these two requirements in PEKS were considered separately and many solutions were proposed dealing with each one. However, no solution is known to satisfy the two requirements at the same time.In this paper we present a new approach to deal with this issue. First, we extend the notion of anonymous Identity-Based Encryption with distributed Private Key Generator to handle the blind key-extraction protocols as in Blind IBE. We call such new schemes blind anonymous (n,t)-IBE, and we give concrete construction of such schemes. Second, we generically transform the blind anonymous (n,t)-IBE into a threshold PEKS with oblivious keyword search satisfying the requirements specified above.
Keywords :
Type de document :
Communication dans un congrès
Bart Decker; David W. Chadwick. 13th International Conference on Communications and Multimedia Security (CMS), Sep 2012, Canterbury, United Kingdom. Springer, Lecture Notes in Computer Science, LNCS-7394, pp.160-173, 2012, Communications and Multimedia Security. 〈10.1007/978-3-642-32805-3_13〉
Domaine :

Littérature citée [25 références]

https://hal.inria.fr/hal-01540893
Contributeur : Hal Ifip <>
Soumis le : vendredi 16 juin 2017 - 16:47:04
Dernière modification le : mercredi 23 mai 2018 - 01:19:50
Document(s) archivé(s) le : mercredi 10 janvier 2018 - 13:50:19

Fichier

978-3-642-32805-3_13_Chapter.p...
Fichiers produits par l'(les) auteur(s)

Citation

Amar Siad. A New Approach for Private Searches on Public-Key Encrypted Data. Bart Decker; David W. Chadwick. 13th International Conference on Communications and Multimedia Security (CMS), Sep 2012, Canterbury, United Kingdom. Springer, Lecture Notes in Computer Science, LNCS-7394, pp.160-173, 2012, Communications and Multimedia Security. 〈10.1007/978-3-642-32805-3_13〉. 〈hal-01540893〉

Métriques

Consultations de la notice

189

Téléchargements de fichiers