Computer Science ›› 2015, Vol. 42 ›› Issue (11): 197-202.doi: 10.11896/j.issn.1002-137X.2015.11.041

Previous Articles     Next Articles

Secure Channel Free Searchable Encryption in Standard Model

FANG Li-ming, HUANG Zhi-qiu and WANG Jian-dong   

  • Online:2018-11-14 Published:2018-11-14

Abstract: Recently,Baek et al.proposed an efficient public key encryption scheme with keyword search based on the scheme of Boneh et al.However,the security model of Baek et al.seriously limits the ability of the adversary.Rhee et al.enhanced the security model of the public key encryption with keyword search to properly incorporate the ability of an adversarys,and presented a PEKS in the random oracle model.Unfortunately,a proof in the random oracle model has shown that it possibly leads to insecure schemes when the random oracles are implemented in the standard model.This paper constructed an efficient public key encryption scheme with keyword search secure in the enhanced security model without random oracle.

Key words: Public key encryption,Searchable encryption,Secure channel free,Standard model

[1] Abdalla M,Bellare M,Catalano D,et al.Advances in Cryptology[C]∥CRYPTO 2005.Springer Berlin Heidelberg,2005:205-222
[2] Baek J,Safavi-Naini R,Susilo W.Computational Science and Its Applications[C]∥ICCSA 2008.Springer Berlin Heidelberg,2008:1249-1259
[3] Boneh D,Boyen X.Efficient selective-ID Identity based encryption without random oracles[C]∥Proc.of EUROCRYPT 2004.Springer Berlin Heidelberg,2004:223-238
[4] Boneh D,Di C G,Ostrovsky R,et al.Public Key Encryptionwith Keyword Search[C]∥Proc.of EUROCRYPT 2004.Springer Berlin Heidelberg,2004:506-522
[5] Canetti R,Goldreich O,Halevi S.The random oracle methodology,revisited[C]∥Proc.of 30th ACM STOC.ACM Press,1998:209-218
[6] Canetti R,Halevi S,Katz J.Chosen-Ciphertext Security fromIdentity-Based Encryption[C]∥Proc.of EUROCRYPT 2004.Springer Berlin Heidelberg,2004:202-222
[7] Fang L,Susilo W,Ge C,et al.Public key encryption with keyword search secure against keyword guessing attacks without random oracle[J].Information Sciences,2013,8:221-241
[8] Gentry C.Practical identity-based encryption without randomoracles[C]∥Proc.of EUROCRYPT 2006.Springer-Verlag,2006:457-464
[9] Gu C,Pan Y,Z A H.Efficient Public Key Encryption with Keyword Search Schemes from Pairings[M]∥Information Security and Cryptology:Third SKLOIS Conference.2008:372-382
[10] Waters B,Balfanz D,Durfee G,et al.Building an Encrypted and Searchable Audit Log[C]∥Network and Distributed System Security Symposium (NDSS 2004).2004
[11] Golle P,Staddon J,Waters B.Secure Conjunctive Search over Encrypted Data [C]∥Jakobsson M,Yung M,Zhou J,eds.Proc.ACNS 2004.Springer-Verlag,2004:31-45
[12] Hofheinz D,Weinreb E.Searchable encryption with decryption in the standard model:Report 2008/423[R].Cryptology ePrint Archive,2008:1-17
[13] Jeong I R,Kwon J O,Hong D,et al.Constructing PEKSschemes secure against keyword guessing attacks is possible? [J].Computer Communications,2009,32(2):394-396
[14] Park D J,Kim K,Lee P J.Public Key Encryption with Conjunctive Field Keyword Search[M]∥Lim C H,Yung M,eds.Information Security Applications:5th International Workshop,WISA 2004.Springer Berlin Heidelberg,2005:73-86
[15] Rhee H S,Park J H,Susilo W,et al.Improved searchable public key encryption with designated tester[C]∥Proc.of the 4th international Symposium on information,Computer,and Communications Security(ASIACCS ’09).ACM,New York,NY,2009:376-379
[16] Rhee H S,Susilo W,Kim H-J.Secure searchable public key encryption scheme against keyword guessing attacks[J].IEICE Electron,2009,6(5):237-243
[17] Rhee H S,Park J H,Lee D H.Generic construction of designa-ted tester public-key encryption with keyword search[J].Information Sciences,2012,205(1):93-109
[18] Xu P,Jin H,Wu Q,et al.Public-Key Encryption with FuzzyKeyword Search:A Provably Secure Scheme under Keyword Guessing Attack[J].IEEE Transactions on Computers,2013,62(11):2266-2277
[19] Yau W C,Heng S H,Goi B.Off-Line Keyword Guessing Attacks on Recent Public Key Encryption with Keyword Search Schemes[C]∥Proc.of ATC 2008.Springer-Verlag,2008:100-105
[20] Zhang R,Imai H.Generic combination of public key encryption with keyword search and public key encryption[C]∥6th International Conference Proc.of Cryptology and Network Security.Springer-Verlag,2007:159-174
[21] 孙婷,王建东.基于模糊关键词搜索的无安全信道公钥加密[J].计算机应用与软件,2014,1(3):308-309 Sun Ting,Wang Jian-dong.Encrypting pubilc key without secure channel based on fuzzy keyword search[J].Computer Applications and Software,2014,1(3):308-309
[22] 李双.一种安全的具有匿名性的可搜索加密方案[J].计算机工程与应用,2013,9(16):97-102 Li Shuang.Safe anonymous identity based public key encryption with keyword search[J].Computer Engineering and Applications,2013,49(16):97-102
[23] 王映康,罗文俊.云存储环境下多用户可搜索加密方案[J].电信科学,2012,28(11):103-107 Wang Ying-kang,Luo Wen-jun.A scheme of multi-user searchable encryption in clould storage[J].Journal Electronic,2012,28(11):103-107
[24] 李双,徐茂智.基于属性的可搜索加密方案[J].计算机学报,2014,37(5):1017-1024 Li Shuang,Xu Mao-zhi.Attribute based public key encryption with keyword search[J].Chinese Journal of Computers,2014,37(5):1017-1024
[25] 杨健,杨邓奇,王剑.关键词可检索的公钥加密技术综述[J].计算机应用,2014,34(7):1878-1883,1896 Yang Jian,Yang Deng-qi,Wang Jian.Overview of public key encryption with keyword search[J].Journal of Computer Applications,2014,34(7):1878-1883,1896

No related articles found!
Full text



[1] LEI Li-hui and WANG Jing. Parallelization of LTL Model Checking Based on Possibility Measure[J]. Computer Science, 2018, 45(4): 71 -75 .
[2] SUN Qi, JIN Yan, HE Kun and XU Ling-xuan. Hybrid Evolutionary Algorithm for Solving Mixed Capacitated General Routing Problem[J]. Computer Science, 2018, 45(4): 76 -82 .
[3] ZHANG Jia-nan and XIAO Ming-yu. Approximation Algorithm for Weighted Mixed Domination Problem[J]. Computer Science, 2018, 45(4): 83 -88 .
[4] WU Jian-hui, HUANG Zhong-xiang, LI Wu, WU Jian-hui, PENG Xin and ZHANG Sheng. Robustness Optimization of Sequence Decision in Urban Road Construction[J]. Computer Science, 2018, 45(4): 89 -93 .
[5] SHI Wen-jun, WU Ji-gang and LUO Yu-chun. Fast and Efficient Scheduling Algorithms for Mobile Cloud Offloading[J]. Computer Science, 2018, 45(4): 94 -99 .
[6] ZHOU Yan-ping and YE Qiao-lin. L1-norm Distance Based Least Squares Twin Support Vector Machine[J]. Computer Science, 2018, 45(4): 100 -105 .
[7] LIU Bo-yi, TANG Xiang-yan and CHENG Jie-ren. Recognition Method for Corn Borer Based on Templates Matching in Muliple Growth Periods[J]. Computer Science, 2018, 45(4): 106 -111 .
[8] GENG Hai-jun, SHI Xin-gang, WANG Zhi-liang, YIN Xia and YIN Shao-ping. Energy-efficient Intra-domain Routing Algorithm Based on Directed Acyclic Graph[J]. Computer Science, 2018, 45(4): 112 -116 .
[9] CUI Qiong, LI Jian-hua, WANG Hong and NAN Ming-li. Resilience Analysis Model of Networked Command Information System Based on Node Repairability[J]. Computer Science, 2018, 45(4): 117 -121 .
[10] WANG Zhen-chao, HOU Huan-huan and LIAN Rui. Path Optimization Scheme for Restraining Degree of Disorder in CMT[J]. Computer Science, 2018, 45(4): 122 -125 .