A New Approach for Private Searches on Public-Key Encrypted Data
نویسنده
چکیده
Public-key Encryption with Keyword Search (PEKS) allows authorized users to search by keywords on encrypted data by generating trapdoors for the desired keywords. Basically there are two requirements for the process of trapdoors generation. On one hand, it is important to allow users to privately search on encrypted data without revealing keywords to the Trapdoor Generation Entity T GE , and solutions proposed are based on the use of blinding protocols between user and T GE . On the other hand, in some applications it is necessary to prevent T GE from generating trapdoors on behalf of a legitimate user, this is done by splitting the T GE and generating trapdoors in distributed manner. Until now, these two requirements in PEKS were considered separately and many solutions were proposed dealing with each one. However, no solution is known to satisfy the two requirements at the same time. In this paper we present a new approach to deal with this issue. First, we extend the notion of anonymous Identity-Based Encryption with distributed Private Key Generator to handle the blind key-extraction protocols as in Blind IBE. We call such new schemes blind anonymous (n, t)IBE, and we give concrete construction of such schemes. Second, we generically transform the blind anonymous (n, t)-IBE into a threshold PEKS with oblivious keyword search satisfying the requirements specified above.
منابع مشابه
Private Key based query on encrypted data
Nowadays, users of information systems have inclination to use a central server to decrease data transferring and maintenance costs. Since such a system is not so trustworthy, users' data usually upkeeps encrypted. However, encryption is not a nostrum for security problems and cannot guarantee the data security. In other words, there are some techniques that can endanger security of encrypted d...
متن کاملBlind and Anonymous Identity-Based Encryption and Authorised Private Searches on Public Key Encrypted Data
Searchable encryption schemes provide an important mechanism to cryptographically protect data while keeping it available to be searched and accessed. In a common approach for their construction, the encrypting entity chooses one or several keywords that describe the content of each encrypted record of data. To perform a search, a user obtains a trapdoor for a keyword of her interest and uses t...
متن کاملTime-Stamping for Malaysia
One of the most promising uses of time-stamping technology lies in combining it with a public key infrastructure. A public-key infrastructure (PKI) consists of protocols, services, and standards supporting applications of public-key cryptography [1]. Public-key cryptography involves the use of a public and private key pair. Data encrypted with a public key can only be decrypted with its related...
متن کاملA New Model of Data Protection on Cloud Storage
This paper focuses on studying cloud storage data protection model and implementing encrypted storage of user data in double-key form. User data are encrypted with symmetric encryption algorithm and this secret key is encrypted with asymmetric encryption algorithm. The private key is managed and controlled by users. In this way, users guarantee the security of their own data with the sole priva...
متن کاملPrivate Searching on Encrypted Data in Cloud
Cloud computing appeared as the most common paradigm in the time being that provides calculations and storage resources by when used – pay method. Users can exploit cloud resources from anywhere at any time without maintenance cost. Flexibility in resource allocation enabled cloud services to be effective in delivering with reasonable cost. However, transfer data to cloud make it vulnerable to ...
متن کامل