Public-Key Encryption with Integrated Keyword Search View Full Text


Ontology type: schema:ScholarlyArticle     


Article Info

DATE

2019-03-05

AUTHORS

Vishal Saraswat, Rajeev Anand Sahu, Gaurav Sharma, Veronika Kuchta, Olivier Markowitch

ABSTRACT

Since the last decade, the public-key encryption with keyword search (PEKS) has been studied as a popular technique for searching data over encrypted files. The notion finds useful application for fine-grained data search on outsourced encrypted data like iCloud, mobile cloud data, etc. In this paper, we present a concrete public-key encryption (PKE)+PEKS scheme and prove its security in the standard model. We prove that our scheme is both IND-PKE-CCA secure, that is, provides message confidentiality against an adaptive chosen-ciphertext adversary, and IND-PEKS-CCA secure, that is, provides keyword privacy against an adaptive chosen-ciphertext adversary, under the Symmetric eXternal Diffie-Hellman (SXDH) assumption. Our construction uses asymmetric pairings which enable a fast implementation useful for practical applications. Our scheme has much shorter ciphertexts than other known PKE+PEKS schemes. Particularly, we compare our scheme with other proposed PEKS and integrated PKE+PEKS schemes and provide a relative analysis of various parameters including assumption, security, and efficiency. More... »

PAGES

12-25

References to SciGraph publications

  • 2009-06-18. A Taxonomy of Pairing-Friendly Elliptic Curves in JOURNAL OF CRYPTOLOGY
  • 2005. Chosen-Ciphertext Security of Multiple Encryption in THEORY OF CRYPTOGRAPHY
  • 2017-11-22. Short Integrated PKE+PEKS in Standard Model in SECURITY, PRIVACY, AND APPLIED CRYPTOGRAPHY ENGINEERING
  • 2013. Shorter IBE and Signatures via Asymmetric Pairings in PAIRING-BASED CRYPTOGRAPHY – PAIRING 2012
  • 2005-10. Elliptic Curves Suitable for Pairing Based Cryptography in DESIGNS, CODES AND CRYPTOGRAPHY
  • 2001-12-04. An Identity Based Encryption Scheme Based on Quadratic Residues in CRYPTOGRAPHY AND CODING
  • 2015-07-17. Implementation of searchable symmetric encryption for privacy-preserving keyword search on cloud storage in HUMAN-CENTRIC COMPUTING AND INFORMATION SCIENCES
  • 2007-01-01. Decryptable Searchable Encryption in PROVABLE SECURITY
  • 2007-01-01. Generic Combination of Public Key Encryption with Keyword Search and Public Key Encryption in CRYPTOLOGY AND NETWORK SECURITY
  • 2002-02-05. Multi-recipient Public-Key Encryption with Shortened Ciphertext in PUBLIC KEY CRYPTOGRAPHY
  • 2008-01-01. Public Key Encryption with Keyword Search Revisited in COMPUTATIONAL SCIENCE AND ITS APPLICATIONS – ICCSA 2008
  • 2010. On the Efficiency and Security of Pairing-Based Protocols in the Type 1 and Type 4 Settings in ARITHMETIC OF FINITE FIELDS
  • 2011. Public-Key Encryption with Delegated Search in APPLIED CRYPTOGRAPHY AND NETWORK SECURITY
  • 2001-03-21. Characterization of Elliptic Curve Traces Under FR-Reduction in INFORMATION SECURITY AND CRYPTOLOGY — ICISC 2000
  • 2013. Shorter Quasi-Adaptive NIZK Proofs for Linear Subspaces in ADVANCES IN CRYPTOLOGY - ASIACRYPT 2013
  • 2006. Anonymous Hierarchical Identity-Based Encryption (Without Random Oracles) in ADVANCES IN CRYPTOLOGY - CRYPTO 2006
  • 2011. On the Joint Security of Encryption and Signature, Revisited in ADVANCES IN CRYPTOLOGY – ASIACRYPT 2011
  • 2016-09-27. Identity-Based Threshold Encryption on Lattices with Application to Searchable Encryption in APPLICATIONS AND TECHNIQUES IN INFORMATION SECURITY
  • 2004. Public Key Encryption with Keyword Search in ADVANCES IN CRYPTOLOGY - EUROCRYPT 2004
  • 2006. On the Integration of Public Key Data Encryption and Public Key Encryption with Keyword Search in INFORMATION SECURITY
  • 2012. Variants of Waters’ Dual System Primitives Using Asymmetric Pairings in PUBLIC KEY CRYPTOGRAPHY – PKC 2012
  • 2006. Pairing-Friendly Elliptic Curves of Prime Order in SELECTED AREAS IN CRYPTOGRAPHY
  • 2007. Public Key Encryption with Searchable Keywords Based on Jacobi Symbols in PROGRESS IN CRYPTOLOGY – INDOCRYPT 2007
  • 1998. Relations among notions of security for public-key encryption schemes in ADVANCES IN CRYPTOLOGY — CRYPTO '98
  • 2001-08-02. Identity-Based Encryption from the Weil Pairing in ADVANCES IN CRYPTOLOGY — CRYPTO 2001
  • 2014. Multi-keyword Similarity Search over Encrypted Cloud Data in ICT SYSTEMS SECURITY AND PRIVACY PROTECTION
  • 2005. Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions in ADVANCES IN CRYPTOLOGY – CRYPTO 2005
  • Identifiers

    URI

    http://scigraph.springernature.com/pub.10.1007/s41635-019-00066-w

    DOI

    http://dx.doi.org/10.1007/s41635-019-00066-w

    DIMENSIONS

    https://app.dimensions.ai/details/publication/pub.1112541280


    Indexing Status Check whether this publication has been indexed by Scopus and Web Of Science using the SN Indexing Status Tool
    Incoming Citations Browse incoming citations for this publication using opencitations.net

    JSON-LD is the canonical representation for SciGraph data.

    TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

    [
      {
        "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
        "about": [
          {
            "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/08", 
            "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
            "name": "Information and Computing Sciences", 
            "type": "DefinedTerm"
          }, 
          {
            "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0804", 
            "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
            "name": "Data Format", 
            "type": "DefinedTerm"
          }
        ], 
        "author": [
          {
            "affiliation": {
              "alternateName": "Indian Institute of Technology Jammu, Jammu, India", 
              "id": "http://www.grid.ac/institutes/grid.499272.3", 
              "name": [
                "Indian Institute of Technology Jammu, Jammu, India"
              ], 
              "type": "Organization"
            }, 
            "familyName": "Saraswat", 
            "givenName": "Vishal", 
            "id": "sg:person.010622625240.35", 
            "sameAs": [
              "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.010622625240.35"
            ], 
            "type": "Person"
          }, 
          {
            "affiliation": {
              "alternateName": "Universit\u00e9 Libre de Bruxelles, Brussels, Belgium", 
              "id": "http://www.grid.ac/institutes/grid.4989.c", 
              "name": [
                "Universit\u00e9 Libre de Bruxelles, Brussels, Belgium"
              ], 
              "type": "Organization"
            }, 
            "familyName": "Sahu", 
            "givenName": "Rajeev Anand", 
            "id": "sg:person.015147600007.98", 
            "sameAs": [
              "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.015147600007.98"
            ], 
            "type": "Person"
          }, 
          {
            "affiliation": {
              "alternateName": "Universit\u00e9 Libre de Bruxelles, Brussels, Belgium", 
              "id": "http://www.grid.ac/institutes/grid.4989.c", 
              "name": [
                "Universit\u00e9 Libre de Bruxelles, Brussels, Belgium"
              ], 
              "type": "Organization"
            }, 
            "familyName": "Sharma", 
            "givenName": "Gaurav", 
            "id": "sg:person.014416425040.13", 
            "sameAs": [
              "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.014416425040.13"
            ], 
            "type": "Person"
          }, 
          {
            "affiliation": {
              "alternateName": "Monash University, Melbourne, Australia", 
              "id": "http://www.grid.ac/institutes/grid.1002.3", 
              "name": [
                "Monash University, Melbourne, Australia"
              ], 
              "type": "Organization"
            }, 
            "familyName": "Kuchta", 
            "givenName": "Veronika", 
            "id": "sg:person.07616673641.56", 
            "sameAs": [
              "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.07616673641.56"
            ], 
            "type": "Person"
          }, 
          {
            "affiliation": {
              "alternateName": "Universit\u00e9 Libre de Bruxelles, Brussels, Belgium", 
              "id": "http://www.grid.ac/institutes/grid.4989.c", 
              "name": [
                "Universit\u00e9 Libre de Bruxelles, Brussels, Belgium"
              ], 
              "type": "Organization"
            }, 
            "familyName": "Markowitch", 
            "givenName": "Olivier", 
            "id": "sg:person.013110422641.81", 
            "sameAs": [
              "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.013110422641.81"
            ], 
            "type": "Person"
          }
        ], 
        "citation": [
          {
            "id": "sg:pub.10.1007/11818175_17", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1023214131", 
              "https://doi.org/10.1007/11818175_17"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-319-71501-8_13", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1092867561", 
              "https://doi.org/10.1007/978-3-319-71501-8_13"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/3-540-45247-8_8", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1047380746", 
              "https://doi.org/10.1007/3-540-45247-8_8"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/s10623-004-3808-4", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1007889132", 
              "https://doi.org/10.1007/s10623-004-3808-4"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/11836810_16", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1012580316", 
              "https://doi.org/10.1007/11836810_16"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-540-69839-5_96", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1033928975", 
              "https://doi.org/10.1007/978-3-540-69839-5_96"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-642-36334-4_8", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1007473379", 
              "https://doi.org/10.1007/978-3-642-36334-4_8"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-642-30057-8_18", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1013168832", 
              "https://doi.org/10.1007/978-3-642-30057-8_18"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1186/s13673-015-0039-9", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1015773954", 
              "https://doi.org/10.1186/s13673-015-0039-9"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/bfb0055718", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1025880961", 
              "https://doi.org/10.1007/bfb0055718"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-540-77026-8_21", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1018307990", 
              "https://doi.org/10.1007/978-3-540-77026-8_21"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-540-75670-5_17", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1000386118", 
              "https://doi.org/10.1007/978-3-540-75670-5_17"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/3-540-45664-3_4", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1020957852", 
              "https://doi.org/10.1007/3-540-45664-3_4"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/11693383_22", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1039881626", 
              "https://doi.org/10.1007/11693383_22"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-642-42033-7_1", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1016744205", 
              "https://doi.org/10.1007/978-3-642-42033-7_1"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/3-540-44647-8_13", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1014375289", 
              "https://doi.org/10.1007/3-540-44647-8_13"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-642-55415-5_5", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1034118695", 
              "https://doi.org/10.1007/978-3-642-55415-5_5"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-642-13797-6_9", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1044537408", 
              "https://doi.org/10.1007/978-3-642-13797-6_9"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-540-76969-9_11", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1022206668", 
              "https://doi.org/10.1007/978-3-540-76969-9_11"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-642-25385-0_9", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1024588166", 
              "https://doi.org/10.1007/978-3-642-25385-0_9"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-540-30576-7_11", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1042535254", 
              "https://doi.org/10.1007/978-3-540-30576-7_11"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-981-10-2741-3_10", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1044198437", 
              "https://doi.org/10.1007/978-981-10-2741-3_10"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/s00145-009-9048-z", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1021781332", 
              "https://doi.org/10.1007/s00145-009-9048-z"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-642-21554-4_31", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1024952316", 
              "https://doi.org/10.1007/978-3-642-21554-4_31"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/11535218_13", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1040580157", 
              "https://doi.org/10.1007/11535218_13"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-540-24676-3_30", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1018428064", 
              "https://doi.org/10.1007/978-3-540-24676-3_30"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/3-540-45325-3_32", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1017397429", 
              "https://doi.org/10.1007/3-540-45325-3_32"
            ], 
            "type": "CreativeWork"
          }
        ], 
        "datePublished": "2019-03-05", 
        "datePublishedReg": "2019-03-05", 
        "description": "Since the last decade, the public-key encryption with keyword search (PEKS) has been studied as a popular technique for searching data over encrypted files. The notion finds useful application for fine-grained data search on outsourced encrypted data like iCloud, mobile cloud data, etc. In this paper, we present a concrete public-key encryption (PKE)+PEKS scheme and prove its security in the standard model. We prove that our scheme is both IND-PKE-CCA secure, that is, provides message confidentiality against an adaptive chosen-ciphertext adversary, and IND-PEKS-CCA secure, that is, provides keyword privacy against an adaptive chosen-ciphertext adversary, under the Symmetric eXternal Diffie-Hellman (SXDH) assumption. Our construction uses asymmetric pairings which enable a fast implementation useful for practical applications. Our scheme has much shorter ciphertexts than other known PKE+PEKS schemes. Particularly, we compare our scheme with other proposed PEKS and integrated PKE+PEKS schemes and provide a relative analysis of various parameters including assumption, security, and efficiency.", 
        "genre": "article", 
        "id": "sg:pub.10.1007/s41635-019-00066-w", 
        "inLanguage": "en", 
        "isAccessibleForFree": false, 
        "isPartOf": [
          {
            "id": "sg:journal.1290439", 
            "issn": [
              "2509-3428", 
              "2509-3436"
            ], 
            "name": "Journal of Hardware and Systems Security", 
            "publisher": "Springer Nature", 
            "type": "Periodical"
          }, 
          {
            "issueNumber": "1", 
            "type": "PublicationIssue"
          }, 
          {
            "type": "PublicationVolume", 
            "volumeNumber": "3"
          }
        ], 
        "keywords": [
          "public-key encryption", 
          "CCA secure", 
          "keyword search", 
          "symmetric external Diffie-Hellman assumption", 
          "external Diffie-Hellman assumption", 
          "Diffie-Hellman assumption", 
          "mobile cloud data", 
          "keyword privacy", 
          "message confidentiality", 
          "short ciphertexts", 
          "cloud data", 
          "fast implementation", 
          "asymmetric pairings", 
          "encryption", 
          "data search", 
          "popular technique", 
          "Secure", 
          "adversary", 
          "security", 
          "scheme", 
          "useful applications", 
          "PEKS", 
          "iCloud", 
          "search", 
          "privacy", 
          "ciphertext", 
          "relative analysis", 
          "practical applications", 
          "confidentiality", 
          "applications", 
          "files", 
          "implementation", 
          "last decade", 
          "data", 
          "standard model", 
          "technique", 
          "efficiency", 
          "assumption", 
          "construction", 
          "model", 
          "notion", 
          "parameters", 
          "pairing", 
          "decades", 
          "analysis", 
          "paper", 
          "concrete public-key encryption", 
          "IND-PKE", 
          "adaptive chosen-ciphertext adversary", 
          "chosen-ciphertext adversary", 
          "IND-PEKS", 
          "Integrated Keyword Search"
        ], 
        "name": "Public-Key Encryption with Integrated Keyword Search", 
        "pagination": "12-25", 
        "productId": [
          {
            "name": "dimensions_id", 
            "type": "PropertyValue", 
            "value": [
              "pub.1112541280"
            ]
          }, 
          {
            "name": "doi", 
            "type": "PropertyValue", 
            "value": [
              "10.1007/s41635-019-00066-w"
            ]
          }
        ], 
        "sameAs": [
          "https://doi.org/10.1007/s41635-019-00066-w", 
          "https://app.dimensions.ai/details/publication/pub.1112541280"
        ], 
        "sdDataset": "articles", 
        "sdDatePublished": "2021-11-01T18:36", 
        "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
        "sdPublisher": {
          "name": "Springer Nature - SN SciGraph project", 
          "type": "Organization"
        }, 
        "sdSource": "s3://com-springernature-scigraph/baseset/20211101/entities/gbq_results/article/article_817.jsonl", 
        "type": "ScholarlyArticle", 
        "url": "https://doi.org/10.1007/s41635-019-00066-w"
      }
    ]
     

    Download the RDF metadata as:  json-ld nt turtle xml License info

    HOW TO GET THIS DATA PROGRAMMATICALLY:

    JSON-LD is a popular format for linked data which is fully compatible with JSON.

    curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/s41635-019-00066-w'

    N-Triples is a line-based linked data format ideal for batch operations.

    curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/s41635-019-00066-w'

    Turtle is a human-readable linked data format.

    curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/s41635-019-00066-w'

    RDF/XML is a standard XML format for linked data.

    curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/s41635-019-00066-w'


     

    This table displays all metadata directly associated to this object as RDF triples.

    252 TRIPLES      22 PREDICATES      104 URIs      69 LITERALS      6 BLANK NODES

    Subject Predicate Object
    1 sg:pub.10.1007/s41635-019-00066-w schema:about anzsrc-for:08
    2 anzsrc-for:0804
    3 schema:author Nd09fa391da4846899a415bdbc6180c51
    4 schema:citation sg:pub.10.1007/11535218_13
    5 sg:pub.10.1007/11693383_22
    6 sg:pub.10.1007/11818175_17
    7 sg:pub.10.1007/11836810_16
    8 sg:pub.10.1007/3-540-44647-8_13
    9 sg:pub.10.1007/3-540-45247-8_8
    10 sg:pub.10.1007/3-540-45325-3_32
    11 sg:pub.10.1007/3-540-45664-3_4
    12 sg:pub.10.1007/978-3-319-71501-8_13
    13 sg:pub.10.1007/978-3-540-24676-3_30
    14 sg:pub.10.1007/978-3-540-30576-7_11
    15 sg:pub.10.1007/978-3-540-69839-5_96
    16 sg:pub.10.1007/978-3-540-75670-5_17
    17 sg:pub.10.1007/978-3-540-76969-9_11
    18 sg:pub.10.1007/978-3-540-77026-8_21
    19 sg:pub.10.1007/978-3-642-13797-6_9
    20 sg:pub.10.1007/978-3-642-21554-4_31
    21 sg:pub.10.1007/978-3-642-25385-0_9
    22 sg:pub.10.1007/978-3-642-30057-8_18
    23 sg:pub.10.1007/978-3-642-36334-4_8
    24 sg:pub.10.1007/978-3-642-42033-7_1
    25 sg:pub.10.1007/978-3-642-55415-5_5
    26 sg:pub.10.1007/978-981-10-2741-3_10
    27 sg:pub.10.1007/bfb0055718
    28 sg:pub.10.1007/s00145-009-9048-z
    29 sg:pub.10.1007/s10623-004-3808-4
    30 sg:pub.10.1186/s13673-015-0039-9
    31 schema:datePublished 2019-03-05
    32 schema:datePublishedReg 2019-03-05
    33 schema:description Since the last decade, the public-key encryption with keyword search (PEKS) has been studied as a popular technique for searching data over encrypted files. The notion finds useful application for fine-grained data search on outsourced encrypted data like iCloud, mobile cloud data, etc. In this paper, we present a concrete public-key encryption (PKE)+PEKS scheme and prove its security in the standard model. We prove that our scheme is both IND-PKE-CCA secure, that is, provides message confidentiality against an adaptive chosen-ciphertext adversary, and IND-PEKS-CCA secure, that is, provides keyword privacy against an adaptive chosen-ciphertext adversary, under the Symmetric eXternal Diffie-Hellman (SXDH) assumption. Our construction uses asymmetric pairings which enable a fast implementation useful for practical applications. Our scheme has much shorter ciphertexts than other known PKE+PEKS schemes. Particularly, we compare our scheme with other proposed PEKS and integrated PKE+PEKS schemes and provide a relative analysis of various parameters including assumption, security, and efficiency.
    34 schema:genre article
    35 schema:inLanguage en
    36 schema:isAccessibleForFree false
    37 schema:isPartOf N089a73cad7a44d1d9df5015639820aa5
    38 Ned6c15a81d5646a9b2371ab8b2051b14
    39 sg:journal.1290439
    40 schema:keywords CCA secure
    41 Diffie-Hellman assumption
    42 IND-PEKS
    43 IND-PKE
    44 Integrated Keyword Search
    45 PEKS
    46 Secure
    47 adaptive chosen-ciphertext adversary
    48 adversary
    49 analysis
    50 applications
    51 assumption
    52 asymmetric pairings
    53 chosen-ciphertext adversary
    54 ciphertext
    55 cloud data
    56 concrete public-key encryption
    57 confidentiality
    58 construction
    59 data
    60 data search
    61 decades
    62 efficiency
    63 encryption
    64 external Diffie-Hellman assumption
    65 fast implementation
    66 files
    67 iCloud
    68 implementation
    69 keyword privacy
    70 keyword search
    71 last decade
    72 message confidentiality
    73 mobile cloud data
    74 model
    75 notion
    76 pairing
    77 paper
    78 parameters
    79 popular technique
    80 practical applications
    81 privacy
    82 public-key encryption
    83 relative analysis
    84 scheme
    85 search
    86 security
    87 short ciphertexts
    88 standard model
    89 symmetric external Diffie-Hellman assumption
    90 technique
    91 useful applications
    92 schema:name Public-Key Encryption with Integrated Keyword Search
    93 schema:pagination 12-25
    94 schema:productId Na990d6a0ff6241fdb3ef1d631b83cace
    95 Nef278e6fae2c480e874f4a3618065b10
    96 schema:sameAs https://app.dimensions.ai/details/publication/pub.1112541280
    97 https://doi.org/10.1007/s41635-019-00066-w
    98 schema:sdDatePublished 2021-11-01T18:36
    99 schema:sdLicense https://scigraph.springernature.com/explorer/license/
    100 schema:sdPublisher N3cd3e75cfd924cd5b6d5e65f0a1c8f52
    101 schema:url https://doi.org/10.1007/s41635-019-00066-w
    102 sgo:license sg:explorer/license/
    103 sgo:sdDataset articles
    104 rdf:type schema:ScholarlyArticle
    105 N089a73cad7a44d1d9df5015639820aa5 schema:volumeNumber 3
    106 rdf:type schema:PublicationVolume
    107 N3cd3e75cfd924cd5b6d5e65f0a1c8f52 schema:name Springer Nature - SN SciGraph project
    108 rdf:type schema:Organization
    109 N486f05fbe98848f89ba7a41f2b884bb7 rdf:first sg:person.07616673641.56
    110 rdf:rest Nf04349b28ada42f8ac843802f9a97e30
    111 N6fe3e120454a4f72b21d6b7bca491234 rdf:first sg:person.014416425040.13
    112 rdf:rest N486f05fbe98848f89ba7a41f2b884bb7
    113 N83c3c83cce4c4b22bba9a882bb72ea85 rdf:first sg:person.015147600007.98
    114 rdf:rest N6fe3e120454a4f72b21d6b7bca491234
    115 Na990d6a0ff6241fdb3ef1d631b83cace schema:name doi
    116 schema:value 10.1007/s41635-019-00066-w
    117 rdf:type schema:PropertyValue
    118 Nd09fa391da4846899a415bdbc6180c51 rdf:first sg:person.010622625240.35
    119 rdf:rest N83c3c83cce4c4b22bba9a882bb72ea85
    120 Ned6c15a81d5646a9b2371ab8b2051b14 schema:issueNumber 1
    121 rdf:type schema:PublicationIssue
    122 Nef278e6fae2c480e874f4a3618065b10 schema:name dimensions_id
    123 schema:value pub.1112541280
    124 rdf:type schema:PropertyValue
    125 Nf04349b28ada42f8ac843802f9a97e30 rdf:first sg:person.013110422641.81
    126 rdf:rest rdf:nil
    127 anzsrc-for:08 schema:inDefinedTermSet anzsrc-for:
    128 schema:name Information and Computing Sciences
    129 rdf:type schema:DefinedTerm
    130 anzsrc-for:0804 schema:inDefinedTermSet anzsrc-for:
    131 schema:name Data Format
    132 rdf:type schema:DefinedTerm
    133 sg:journal.1290439 schema:issn 2509-3428
    134 2509-3436
    135 schema:name Journal of Hardware and Systems Security
    136 schema:publisher Springer Nature
    137 rdf:type schema:Periodical
    138 sg:person.010622625240.35 schema:affiliation grid-institutes:grid.499272.3
    139 schema:familyName Saraswat
    140 schema:givenName Vishal
    141 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.010622625240.35
    142 rdf:type schema:Person
    143 sg:person.013110422641.81 schema:affiliation grid-institutes:grid.4989.c
    144 schema:familyName Markowitch
    145 schema:givenName Olivier
    146 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.013110422641.81
    147 rdf:type schema:Person
    148 sg:person.014416425040.13 schema:affiliation grid-institutes:grid.4989.c
    149 schema:familyName Sharma
    150 schema:givenName Gaurav
    151 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.014416425040.13
    152 rdf:type schema:Person
    153 sg:person.015147600007.98 schema:affiliation grid-institutes:grid.4989.c
    154 schema:familyName Sahu
    155 schema:givenName Rajeev Anand
    156 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.015147600007.98
    157 rdf:type schema:Person
    158 sg:person.07616673641.56 schema:affiliation grid-institutes:grid.1002.3
    159 schema:familyName Kuchta
    160 schema:givenName Veronika
    161 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.07616673641.56
    162 rdf:type schema:Person
    163 sg:pub.10.1007/11535218_13 schema:sameAs https://app.dimensions.ai/details/publication/pub.1040580157
    164 https://doi.org/10.1007/11535218_13
    165 rdf:type schema:CreativeWork
    166 sg:pub.10.1007/11693383_22 schema:sameAs https://app.dimensions.ai/details/publication/pub.1039881626
    167 https://doi.org/10.1007/11693383_22
    168 rdf:type schema:CreativeWork
    169 sg:pub.10.1007/11818175_17 schema:sameAs https://app.dimensions.ai/details/publication/pub.1023214131
    170 https://doi.org/10.1007/11818175_17
    171 rdf:type schema:CreativeWork
    172 sg:pub.10.1007/11836810_16 schema:sameAs https://app.dimensions.ai/details/publication/pub.1012580316
    173 https://doi.org/10.1007/11836810_16
    174 rdf:type schema:CreativeWork
    175 sg:pub.10.1007/3-540-44647-8_13 schema:sameAs https://app.dimensions.ai/details/publication/pub.1014375289
    176 https://doi.org/10.1007/3-540-44647-8_13
    177 rdf:type schema:CreativeWork
    178 sg:pub.10.1007/3-540-45247-8_8 schema:sameAs https://app.dimensions.ai/details/publication/pub.1047380746
    179 https://doi.org/10.1007/3-540-45247-8_8
    180 rdf:type schema:CreativeWork
    181 sg:pub.10.1007/3-540-45325-3_32 schema:sameAs https://app.dimensions.ai/details/publication/pub.1017397429
    182 https://doi.org/10.1007/3-540-45325-3_32
    183 rdf:type schema:CreativeWork
    184 sg:pub.10.1007/3-540-45664-3_4 schema:sameAs https://app.dimensions.ai/details/publication/pub.1020957852
    185 https://doi.org/10.1007/3-540-45664-3_4
    186 rdf:type schema:CreativeWork
    187 sg:pub.10.1007/978-3-319-71501-8_13 schema:sameAs https://app.dimensions.ai/details/publication/pub.1092867561
    188 https://doi.org/10.1007/978-3-319-71501-8_13
    189 rdf:type schema:CreativeWork
    190 sg:pub.10.1007/978-3-540-24676-3_30 schema:sameAs https://app.dimensions.ai/details/publication/pub.1018428064
    191 https://doi.org/10.1007/978-3-540-24676-3_30
    192 rdf:type schema:CreativeWork
    193 sg:pub.10.1007/978-3-540-30576-7_11 schema:sameAs https://app.dimensions.ai/details/publication/pub.1042535254
    194 https://doi.org/10.1007/978-3-540-30576-7_11
    195 rdf:type schema:CreativeWork
    196 sg:pub.10.1007/978-3-540-69839-5_96 schema:sameAs https://app.dimensions.ai/details/publication/pub.1033928975
    197 https://doi.org/10.1007/978-3-540-69839-5_96
    198 rdf:type schema:CreativeWork
    199 sg:pub.10.1007/978-3-540-75670-5_17 schema:sameAs https://app.dimensions.ai/details/publication/pub.1000386118
    200 https://doi.org/10.1007/978-3-540-75670-5_17
    201 rdf:type schema:CreativeWork
    202 sg:pub.10.1007/978-3-540-76969-9_11 schema:sameAs https://app.dimensions.ai/details/publication/pub.1022206668
    203 https://doi.org/10.1007/978-3-540-76969-9_11
    204 rdf:type schema:CreativeWork
    205 sg:pub.10.1007/978-3-540-77026-8_21 schema:sameAs https://app.dimensions.ai/details/publication/pub.1018307990
    206 https://doi.org/10.1007/978-3-540-77026-8_21
    207 rdf:type schema:CreativeWork
    208 sg:pub.10.1007/978-3-642-13797-6_9 schema:sameAs https://app.dimensions.ai/details/publication/pub.1044537408
    209 https://doi.org/10.1007/978-3-642-13797-6_9
    210 rdf:type schema:CreativeWork
    211 sg:pub.10.1007/978-3-642-21554-4_31 schema:sameAs https://app.dimensions.ai/details/publication/pub.1024952316
    212 https://doi.org/10.1007/978-3-642-21554-4_31
    213 rdf:type schema:CreativeWork
    214 sg:pub.10.1007/978-3-642-25385-0_9 schema:sameAs https://app.dimensions.ai/details/publication/pub.1024588166
    215 https://doi.org/10.1007/978-3-642-25385-0_9
    216 rdf:type schema:CreativeWork
    217 sg:pub.10.1007/978-3-642-30057-8_18 schema:sameAs https://app.dimensions.ai/details/publication/pub.1013168832
    218 https://doi.org/10.1007/978-3-642-30057-8_18
    219 rdf:type schema:CreativeWork
    220 sg:pub.10.1007/978-3-642-36334-4_8 schema:sameAs https://app.dimensions.ai/details/publication/pub.1007473379
    221 https://doi.org/10.1007/978-3-642-36334-4_8
    222 rdf:type schema:CreativeWork
    223 sg:pub.10.1007/978-3-642-42033-7_1 schema:sameAs https://app.dimensions.ai/details/publication/pub.1016744205
    224 https://doi.org/10.1007/978-3-642-42033-7_1
    225 rdf:type schema:CreativeWork
    226 sg:pub.10.1007/978-3-642-55415-5_5 schema:sameAs https://app.dimensions.ai/details/publication/pub.1034118695
    227 https://doi.org/10.1007/978-3-642-55415-5_5
    228 rdf:type schema:CreativeWork
    229 sg:pub.10.1007/978-981-10-2741-3_10 schema:sameAs https://app.dimensions.ai/details/publication/pub.1044198437
    230 https://doi.org/10.1007/978-981-10-2741-3_10
    231 rdf:type schema:CreativeWork
    232 sg:pub.10.1007/bfb0055718 schema:sameAs https://app.dimensions.ai/details/publication/pub.1025880961
    233 https://doi.org/10.1007/bfb0055718
    234 rdf:type schema:CreativeWork
    235 sg:pub.10.1007/s00145-009-9048-z schema:sameAs https://app.dimensions.ai/details/publication/pub.1021781332
    236 https://doi.org/10.1007/s00145-009-9048-z
    237 rdf:type schema:CreativeWork
    238 sg:pub.10.1007/s10623-004-3808-4 schema:sameAs https://app.dimensions.ai/details/publication/pub.1007889132
    239 https://doi.org/10.1007/s10623-004-3808-4
    240 rdf:type schema:CreativeWork
    241 sg:pub.10.1186/s13673-015-0039-9 schema:sameAs https://app.dimensions.ai/details/publication/pub.1015773954
    242 https://doi.org/10.1186/s13673-015-0039-9
    243 rdf:type schema:CreativeWork
    244 grid-institutes:grid.1002.3 schema:alternateName Monash University, Melbourne, Australia
    245 schema:name Monash University, Melbourne, Australia
    246 rdf:type schema:Organization
    247 grid-institutes:grid.4989.c schema:alternateName Université Libre de Bruxelles, Brussels, Belgium
    248 schema:name Université Libre de Bruxelles, Brussels, Belgium
    249 rdf:type schema:Organization
    250 grid-institutes:grid.499272.3 schema:alternateName Indian Institute of Technology Jammu, Jammu, India
    251 schema:name Indian Institute of Technology Jammu, Jammu, India
    252 rdf:type schema:Organization
     




    Preview window. Press ESC to close (or click here)


    ...