TY - GEN
T1 - Keyword updatable PEKS
AU - Rhee, Hyun Sook
AU - Lee, Dong Hoon
PY - 2016
Y1 - 2016
N2 - Secure keyword search in the asymmetric setting, also known as public-key encryption with keyword search (PEKS), enables a receiver to search the encrypted messages with a keyword without revealing any information on the messages to the server in the store-and-forward system such as an e-mail system. To make this possible, a sender encrypts a keyword with a receiver’s public-key and tags the encrypted keyword to the messages. In the paper, we propose PEKS with keyword updatablility (KU-PEKS), where a tagged keyword can be updated upon the receiver’s request. The proposed KU-PEKS is generically constructed and provides ciphertext confidentiality and keyword-update privacy. This keyword updatability enables synonym search and/or similarity search in PEKS. We also propose a generic transformation from KU-PEKS to secure keyword search in the symmetric setting, that is the first attempt to generically construct secure keyword search in the symmetric setting providing trapdoor privacy.
AB - Secure keyword search in the asymmetric setting, also known as public-key encryption with keyword search (PEKS), enables a receiver to search the encrypted messages with a keyword without revealing any information on the messages to the server in the store-and-forward system such as an e-mail system. To make this possible, a sender encrypts a keyword with a receiver’s public-key and tags the encrypted keyword to the messages. In the paper, we propose PEKS with keyword updatablility (KU-PEKS), where a tagged keyword can be updated upon the receiver’s request. The proposed KU-PEKS is generically constructed and provides ciphertext confidentiality and keyword-update privacy. This keyword updatability enables synonym search and/or similarity search in PEKS. We also propose a generic transformation from KU-PEKS to secure keyword search in the symmetric setting, that is the first attempt to generically construct secure keyword search in the symmetric setting providing trapdoor privacy.
KW - Searchable encryption
KW - Trapdoor privacy
KW - Updatable PEKS
UR - http://www.scopus.com/inward/record.url?scp=84962231683&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84962231683&partnerID=8YFLogxK
U2 - 10.1007/978-3-319-31875-2_9
DO - 10.1007/978-3-319-31875-2_9
M3 - Conference contribution
AN - SCOPUS:84962231683
SN - 9783319318745
VL - 9503
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 96
EP - 109
BT - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
PB - Springer Verlag
T2 - 16th International Workshop on Information Security Applications, WISA 2015
Y2 - 20 August 2015 through 22 August 2015
ER -