2007
DOI: 10.1007/s00145-007-9006-6
|View full text |Cite
|
Sign up to set email alerts
|

Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions

Abstract: We identify and fill some gaps with regard to consistency (the extent to which false positives are produced) for public-key encryption with keyword search (PEKS). We define computational and statistical relaxations of the existing notion of perfect consistency, show that the scheme of [7] is computationally consistent, and provide a new scheme that is statistically consistent. We also provide a transform of an anonymous IBE scheme to a secure PEKS scheme that, unlike the previous one, guarantees consistency. F… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
147
0
3

Year Published

2010
2010
2024
2024

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 284 publications
(150 citation statements)
references
References 24 publications
0
147
0
3
Order By: Relevance
“…The concept of anonymity for encryption schemes has been around for sometime but was first formalized in the context of symmetric-key encryption [1,11,14] and was later extended to the case of public-key encryption (PKE) and identity-based encryption (IBE) [5,2]. Several PKE and IBE schemes in the literature such as the Cramer-Shoup [10], and the Boyen-Waters [9] in the standard model, and DHIES [4] and Boneh-Franklin [8] in the random oracle model are shown to be anonymous.…”
Section: Anonymity Of Hybrid Encryption Schemesmentioning
confidence: 99%
See 4 more Smart Citations
“…The concept of anonymity for encryption schemes has been around for sometime but was first formalized in the context of symmetric-key encryption [1,11,14] and was later extended to the case of public-key encryption (PKE) and identity-based encryption (IBE) [5,2]. Several PKE and IBE schemes in the literature such as the Cramer-Shoup [10], and the Boyen-Waters [9] in the standard model, and DHIES [4] and Boneh-Franklin [8] in the random oracle model are shown to be anonymous.…”
Section: Anonymity Of Hybrid Encryption Schemesmentioning
confidence: 99%
“…Traditionally, the definitions of privacy [15,19,12] and anonymity [5,2] for encryption schemes are introduced separately. However, when considering robustness, it makes sense to consider both notions simultaneously.…”
Section: Preliminariesmentioning
confidence: 99%
See 3 more Smart Citations