Improved searchable public key encryption with designated tester

Hyun Sook Rhee, Jong Hwan Park, Willy Susilo, Dong Hoon Lee

Research output: Chapter in Book/Report/Conference proceedingConference contribution

100 Citations (Scopus)

Abstract

Recently, Baek et al. proposed an efficient public key encryption scheme with keyword search based on the scheme of Boneh et al., However, the security model of Baek et al. seriously limits the ability of the adversary. In this paper, we enhance the security model of the public key encryption with keyword search to properly incorporate the ability of an adversary. We also construct a public key encryption scheme with keyword search secure in the enhanced security model.

Original languageEnglish
Title of host publicationProceedings of the 4th International Symposium on ACM Symposium on Information, Computer and Communications Security, ASIACCS'09
Pages376-379
Number of pages4
DOIs
Publication statusPublished - 2009
Event4th International Symposium on ACM Symposium on Information, Computer and Communications Security, ASIACCS'09 - Sydney, NSW, Australia
Duration: 2009 Mar 102009 Mar 12

Publication series

NameProceedings of the 4th International Symposium on ACM Symposium on Information, Computer and Communications Security, ASIACCS'09

Other

Other4th International Symposium on ACM Symposium on Information, Computer and Communications Security, ASIACCS'09
CountryAustralia
CitySydney, NSW
Period09/3/1009/3/12

Keywords

  • Designated tester
  • Public key encryption with keyword search
  • Searchable encryption

ASJC Scopus subject areas

  • Computational Theory and Mathematics
  • Computer Networks and Communications
  • Computer Science Applications

Fingerprint Dive into the research topics of 'Improved searchable public key encryption with designated tester'. Together they form a unique fingerprint.

  • Cite this

    Rhee, H. S., Park, J. H., Susilo, W., & Lee, D. H. (2009). Improved searchable public key encryption with designated tester. In Proceedings of the 4th International Symposium on ACM Symposium on Information, Computer and Communications Security, ASIACCS'09 (pp. 376-379). (Proceedings of the 4th International Symposium on ACM Symposium on Information, Computer and Communications Security, ASIACCS'09). https://doi.org/10.1145/1533057.1533108