Keyword updatable PEKS

Hyun Sook Rhee, Dong Hoon Lee

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Secure keyword search in the asymmetric setting, also known as public-key encryption with keyword search (PEKS), enables a receiver to search the encrypted messages with a keyword without revealing any information on the messages to the server in the store-and-forward system such as an e-mail system. To make this possible, a sender encrypts a keyword with a receiver’s public-key and tags the encrypted keyword to the messages. In the paper, we propose PEKS with keyword updatablility (KU-PEKS), where a tagged keyword can be updated upon the receiver’s request. The proposed KU-PEKS is generically constructed and provides ciphertext confidentiality and keyword-update privacy. This keyword updatability enables synonym search and/or similarity search in PEKS. We also propose a generic transformation from KU-PEKS to secure keyword search in the symmetric setting, that is the first attempt to generically construct secure keyword search in the symmetric setting providing trapdoor privacy.

Original languageEnglish
Title of host publicationLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
PublisherSpringer Verlag
Pages96-109
Number of pages14
Volume9503
ISBN (Print)9783319318745
DOIs
Publication statusPublished - 2016
Event16th International Workshop on Information Security Applications, WISA 2015 - Jeju Island, Korea, Republic of
Duration: 2015 Aug 202015 Aug 22

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume9503
ISSN (Print)03029743
ISSN (Electronic)16113349

Other

Other16th International Workshop on Information Security Applications, WISA 2015
CountryKorea, Republic of
CityJeju Island
Period15/8/2015/8/22

Fingerprint

Keyword Search
Public Key Encryption
Cryptography
Receiver
Privacy
Similarity Search
Servers
Confidentiality
Public key
Electronic Mail
Server
Update

Keywords

  • Searchable encryption
  • Trapdoor privacy
  • Updatable PEKS

ASJC Scopus subject areas

  • Computer Science(all)
  • Theoretical Computer Science

Cite this

Rhee, H. S., & Lee, D. H. (2016). Keyword updatable PEKS. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 9503, pp. 96-109). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 9503). Springer Verlag. https://doi.org/10.1007/978-3-319-31875-2_9

Keyword updatable PEKS. / Rhee, Hyun Sook; Lee, Dong Hoon.

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 9503 Springer Verlag, 2016. p. 96-109 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 9503).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Rhee, HS & Lee, DH 2016, Keyword updatable PEKS. in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). vol. 9503, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 9503, Springer Verlag, pp. 96-109, 16th International Workshop on Information Security Applications, WISA 2015, Jeju Island, Korea, Republic of, 15/8/20. https://doi.org/10.1007/978-3-319-31875-2_9
Rhee HS, Lee DH. Keyword updatable PEKS. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 9503. Springer Verlag. 2016. p. 96-109. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)). https://doi.org/10.1007/978-3-319-31875-2_9
Rhee, Hyun Sook ; Lee, Dong Hoon. / Keyword updatable PEKS. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 9503 Springer Verlag, 2016. pp. 96-109 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)).
@inproceedings{ba9075295d1b49bc831c110a4cac8071,
title = "Keyword updatable PEKS",
abstract = "Secure keyword search in the asymmetric setting, also known as public-key encryption with keyword search (PEKS), enables a receiver to search the encrypted messages with a keyword without revealing any information on the messages to the server in the store-and-forward system such as an e-mail system. To make this possible, a sender encrypts a keyword with a receiver’s public-key and tags the encrypted keyword to the messages. In the paper, we propose PEKS with keyword updatablility (KU-PEKS), where a tagged keyword can be updated upon the receiver’s request. The proposed KU-PEKS is generically constructed and provides ciphertext confidentiality and keyword-update privacy. This keyword updatability enables synonym search and/or similarity search in PEKS. We also propose a generic transformation from KU-PEKS to secure keyword search in the symmetric setting, that is the first attempt to generically construct secure keyword search in the symmetric setting providing trapdoor privacy.",
keywords = "Searchable encryption, Trapdoor privacy, Updatable PEKS",
author = "Rhee, {Hyun Sook} and Lee, {Dong Hoon}",
year = "2016",
doi = "10.1007/978-3-319-31875-2_9",
language = "English",
isbn = "9783319318745",
volume = "9503",
series = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",
publisher = "Springer Verlag",
pages = "96--109",
booktitle = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",

}

TY - GEN

T1 - Keyword updatable PEKS

AU - Rhee, Hyun Sook

AU - Lee, Dong Hoon

PY - 2016

Y1 - 2016

N2 - Secure keyword search in the asymmetric setting, also known as public-key encryption with keyword search (PEKS), enables a receiver to search the encrypted messages with a keyword without revealing any information on the messages to the server in the store-and-forward system such as an e-mail system. To make this possible, a sender encrypts a keyword with a receiver’s public-key and tags the encrypted keyword to the messages. In the paper, we propose PEKS with keyword updatablility (KU-PEKS), where a tagged keyword can be updated upon the receiver’s request. The proposed KU-PEKS is generically constructed and provides ciphertext confidentiality and keyword-update privacy. This keyword updatability enables synonym search and/or similarity search in PEKS. We also propose a generic transformation from KU-PEKS to secure keyword search in the symmetric setting, that is the first attempt to generically construct secure keyword search in the symmetric setting providing trapdoor privacy.

AB - Secure keyword search in the asymmetric setting, also known as public-key encryption with keyword search (PEKS), enables a receiver to search the encrypted messages with a keyword without revealing any information on the messages to the server in the store-and-forward system such as an e-mail system. To make this possible, a sender encrypts a keyword with a receiver’s public-key and tags the encrypted keyword to the messages. In the paper, we propose PEKS with keyword updatablility (KU-PEKS), where a tagged keyword can be updated upon the receiver’s request. The proposed KU-PEKS is generically constructed and provides ciphertext confidentiality and keyword-update privacy. This keyword updatability enables synonym search and/or similarity search in PEKS. We also propose a generic transformation from KU-PEKS to secure keyword search in the symmetric setting, that is the first attempt to generically construct secure keyword search in the symmetric setting providing trapdoor privacy.

KW - Searchable encryption

KW - Trapdoor privacy

KW - Updatable PEKS

UR - http://www.scopus.com/inward/record.url?scp=84962231683&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84962231683&partnerID=8YFLogxK

U2 - 10.1007/978-3-319-31875-2_9

DO - 10.1007/978-3-319-31875-2_9

M3 - Conference contribution

AN - SCOPUS:84962231683

SN - 9783319318745

VL - 9503

T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

SP - 96

EP - 109

BT - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

PB - Springer Verlag

ER -