Survey on Searchable Public-key Cipher Texts for Privacy Preserving Keyword Search

نویسندگان

  • Vina M. Lomte
  • Gauri S. Patil
چکیده

The Public Key Encryption along with Keyword Search allows one to search the data that is in encrypted form with a keyword without showing any information. This paper gives the detail study on searchable Public-Key Ciphertexts with Hidden Structures (SPCHS) that fastenthe keyword search without sacrificing the security of encrypted keywords. In SPCHS, the keyword ciphertexts is structured by hidden relation and by using a trapdoor function used in cryptography to keywords to disclose minimum information to search algorithm. In SPCHS Schema,cipher texts have hidden star like structure. The SPCHS construction is based on IBKEM i.e. Identity BasedKeyword Encapsulation Management that splits the computation in two parts first that perform heavy computation and other cipher text produced by light computation. The generic SPCHS construction is built with IBE i.e. Identity Based Encryption and Collision-free fullidentity malleability IBKEM.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Effective Secure Multi-keyword Top-k Retrieval over Relational Databases

Keyword has emerging as a promising pattern for data outsourcing and high-quality data services. However, concerns of sensitive information on potentially cause privacy problems. Data encryption protects data security to some extent, but at the cost of compromised efficiency. Searchable symmetric encryption (SSE) allows retrieval of encrypted data. In this paper, we focus on addressing data pri...

متن کامل

SESA: an efficient searchable encryption scheme for auction in emerging smart grid marketing

Distributed energy resources (DERs), which are characterized by small-scale power generation technologies to provide an enhancement of the traditional power system, have been strongly encouraged to be integrated into the smart grid, and numerous trading strategies have recently been proposed to support the energy auction in the emerging smart grid marketing. However, few of them consider the se...

متن کامل

Anonymous Hierarchical Identity-Based Encryption with Constant Size Ciphertexts

Efficient and privacy-preserving constructions for search functionality on encrypted data is important issues for data outsourcing, and data retrieval, etc. Fully secure anonymous Hierarchical ID-Based Encryption (HIBE) schemes is useful primitives that can be applicable to searchable encryptions [4], such as ID-based searchable encryption, temporary searchable encryption [1], and anonymous for...

متن کامل

Deterministic and Efficiently Searchable Encryption

We present as-strong-as-possible definitions of privacy, and constructions achieving them,for public-key encryption schemes where the encryption algorithm is deterministic. We obtainas a consequence database encryption methods that permit fast (i.e. sub-linear, and in factlogarithmic, time) search while provably providing privacy that is as strong as possible subjectto this ...

متن کامل

An efficient and secure privacy-preserving approach for outsourced data of resource constrained mobile devices in cloud computing

Outsourcing of data into cloud has become an effective trend in modern day computing due to its ability to provide low-cost, pay-as-you-go IT services. Although cloud based services offer many advantages, privacy of the outsourced data is a big concern. To mitigate this concern, it is desirable to outsource sensitive data in an encrypted form but cost of encryption process would increase the he...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2016