Browse > Article
http://dx.doi.org/10.13089/JKIISC.2009.19.2.31

Public Key Encryption with Keyword Search in Multi-Receiver Setting  

Rhee, Hyun-Sook (University of Wollongong)
Park, Jong-Hwan (Korea University)
Rhee, Dong-Hoon (Korea University)
Abstract
To provide the privacy of a keyword, a public key encryption with keyword search(PEKS) firstly was propsed by Boneh et al. The PEKS scheme enables that an email sender sends an encrypted email with receiver's public key to an email server and a server can obtain the relation between the given encrypted email and an encrypted query generated by a receiver. In this email system, we easily consider the situation that a user sends the one identical encrypted email to multi-receiver like as group e-mail. Hwang and Lee proposed a searchable public key encryption considering multi-receivers. To reduce the size of transmission data and the server's computation is important issue in multi-receiver setting. In this paper, we propose an efficient searchable public key encryption for multi-receiver (mPEKS) which is more efficient and reduces the server's pairing computation.
Keywords
Public key encryption with keyword search; Searchable encryption;
Citations & Related Records
연도 인용수 순위
  • Reference
1 D. Boneh, G.D. Crescenzo, R. Ostrovsky, and G. Persiano, "Public Key Encryption with Keyword Search," In Advances in Cryptology-Eurocrypt 2004, LNCS 3027, pp. 506-522, 2004   DOI   ScienceOn
2 P. Golle, J. Staddon, and B. Waters, "Secure conjunctive keyword search over encrypted data," In proceedings of ACNS 2004, LNCS 3089, pp. 31-45, 2004   DOI
3 E.J. Goh, "Secure Incexes," Technical report 2003-216, In IACR ePrint Cryptography Archive, 2003
4 R. Richardson, "2007 CSI Computer Crime and Security Survey," The 12th Annual report of computer security society, CSt 2007
5 D.X. Song, D. Wagner, and A. Perrig, "Practical techniques for searches on encrypted data," In Symposium on Security and Privacy IEEE, pp. 44-55, May 2000
6 W. Ogata and K. Kurosawa, "Oblivious Keyword Search," Journal of Complexity,Vol. 20, No. 2-3, pp. 356-371, Apr.-June,2004   DOI   ScienceOn
7 Y.C. Chang and M. Mitzenmacher, "Privacy preserving keyword searches on remote encrypted data," In Third International Conference on Applied Cryptography and Network Security(ACNS 2005), LNCS 3531, pp. 442-455, 2005   DOI
8 Y.H. Hwang and P.J. Lee, "Public Key Encryption with Conjunctive Keyword Search and Its Extension to a Multi-user System," In proceedings of Pairing 2007, LNCS 4575, pp. 2-22, 2007   DOI
9 D. Boneh and B. Waters, "Conjunctive, subset, and range queries on encrypted data," In proceedings of TCC'07, LNCS 4392, pp. 535-554, 2007   DOI   ScienceOn