Registered Keyword Searchable Encryption Based on SM9
نویسندگان
چکیده
The SM9 algorithm is an Identity-Based Encryption (IBE) independently made by China. existing searchable encryption scheme cannot be effective against insider keyword guessing attacks and violates users’ data privacy. This article utilizes the method to propose a Registered Public Keyword Searchable based on (RKSE-SM9), which uses user keys in registration algorithm. For RKSE-SM9 generate ciphertext or trapdoor, secure server must first register keyword, effectively reasonably protects resists honest curious cloud servers. From there, we also utilize Beaver’s triple construct improved registered generation algorithm, defining proving that satisfies concept of indistinguishability keywords, achieving higher level In addition, compared with encryption, our proved guarantee better security while reducing computational efficiency only 1%; scheme, overall operational increases 63%.
منابع مشابه
Searchable Keyword-Based Encryption
To solve the problem of searching on encrypted data, many keyword search schemes have been proposed in recent years. The goal of such schemes is to enable a user to give an untrusted storage server the ability only to test whether an encrypted document contains a few keywords without learning anything else about the document. In this paper, we are concerned with decrypting the searched results ...
متن کاملSearchable Encryption with Keyword-Recoverability
Searchable encryption has many applications including email systems and storage systems. The usefulness of searchable encryption derives from its support of keyword-testability. Keyword-testability means that a receiver of a ciphertext can test whether the ciphertext contains a specific keyword. Recently, Bellare et al. suggested an efficientlysearchable encryption scheme with keyword-recoverab...
متن کاملCorrelation-Resistant Storage via Keyword-Searchable Encryption
We consider the problem of using untrusted components to build correlation-resistant survivable storage systems that protect file replica locations, while allowing nodes to continuously re-distribute files throughout the network. The principal contribution is a chosen-ciphertext secure, searchable public key encryption scheme which allows for dynamic re-encryption of ciphertexts, and provides f...
متن کاملPublic-Key Encryption with Registered Keyword Search
Public-key Encryption with Keyword Search (PEKS) enables a server to test whether a tag from a sender and a trapdoor from a receiver contain the same keyword. In this paper, we highlight some potential security concern, i.e. a curious server is able to answer whether any selected keyword is corresponding to a given trapdoor or not (called an offline keyword guessing attack). The existing semant...
متن کاملSearchable Encryption and Fuzzy Keyword Search in Cloud Computing Technology
Cloud computing is a technology that uses the internet and central remote servers to keep up data and applications. As becomes more mature, many organizations and individuals are attracted in storing more accessible data e.g. personal data files, company related information in the cloud. This technology allows for much more efficient computing by centralizing storage, memory, processing and ban...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Applied sciences
سال: 2023
ISSN: ['2076-3417']
DOI: https://doi.org/10.3390/app13053226