DOI: 10.1007/978-3-540-69839-5_96
|View full text |Cite
|
Sign up to set email alerts
|

Public Key Encryption with Keyword Search Revisited

Abstract: The public key encryption with keyword search (PEKS) scheme recently proposed by Boneh, Di Crescenzo, Ostrovsky, and Persiano enables one to search encrypted keywords without compromising the security of the original data. In this paper, we address three important issues of a PEKS scheme, "refreshing keywords", "removing secure channel", and "processing multiple keywords", which have not been considered in Boneh et. al.'s paper. We argue that care must be taken when keywords are used frequently in the PEKS sch… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
350
0
3

Publication Types

Select...
7

Relationship

0
7

Authors

Journals

citations
Cited by 372 publications
(354 citation statements)
references
References 11 publications
1
350
0
3
Order By: Relevance
“…Secure computations on binary decision trees were introduced in [8], yet they have long execution time due to the use of the IBM HElib library. Searching an encrypted database was previeously addressed by [4], [6], [7], [14]. One drawback in [4], [6] was the need for a special key to aid the server in performing the search request.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…Secure computations on binary decision trees were introduced in [8], yet they have long execution time due to the use of the IBM HElib library. Searching an encrypted database was previeously addressed by [4], [6], [7], [14]. One drawback in [4], [6] was the need for a special key to aid the server in performing the search request.…”
Section: Related Workmentioning
confidence: 99%
“…Searching an encrypted database was previeously addressed by [4], [6], [7], [14]. One drawback in [4], [6] was the need for a special key to aid the server in performing the search request. They achieve a weaker security notion, namely one where partial information about the data access pattern is leaked.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Key Encryption with Keyword Search (PEKS) is an asymmetric cryptographic mechanism that allows an entity to delegate the storage of its encrypted data, while preserving the capability to search encrypted keywords related to the encrypted information [9,10]. The entity uses the public key of a recipient PK to calculate the searchable encryption SPEKS of a set of keywords kw = {kw 1 , kw 2 , .…”
Section: Public Key Encryption With Abstractearch the Publicmentioning
confidence: 99%
“…Upon receiving the random nonce, ATA generates its own random nonce 15 and a random symmetric key 10 , 10 )) and uses it to obtain ( 14 , 15 , PCRL V ) = SDec( 10 , SEnc( 10 , ( 14, 15, PCRL V ))). Upon decrypting the data, Cloud ATA verifies the freshness of the message by comparing the decrypted 14 with the previously generated 14.…”
Section: Interregion Pseudo-certificatementioning
confidence: 99%