Oblivious conjunctive keyword search

Hyun Sook Rhee, Jin Wook Byun, Dong Hoon Lee, Jongin Lim

Research output: Chapter in Book/Report/Conference proceedingConference contribution

12 Citations (Scopus)

Abstract

We study the problem of keyword search in which a server contains various multimedia contents and a user of server wishes to retrieve some multimedia item containing specific keywords without revealing to the server which item it is. Recently, Ogata and Kurosawa introduced an interesting keyword search scheme called oblivious keyword search by using the notion of oblivious transfer. However, only one keyword can be searched in each query, hence the scheme cannot provide a conjunctive keyword search which finds items containing each of several keywords. In this paper, we firstly design a conjunctive keyword search by using the oblivious transfer, and present oblivious conjunctive keyword search (for short, OCKS). We prove that OCKS protocol is secure under the intractability of RSA known target inversion problem.

Original languageEnglish
Title of host publicationInformation Security Applications - 6th International Workshop, WISA 2005, Revised Selected Papers
Pages318-327
Number of pages10
Publication statusPublished - 2005
Event6th International Workshop on Information Security Applications, WISA 2005 - Jeju Island, Korea, Republic of
Duration: 2005 Aug 222005 Aug 24

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume3786 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Other

Other6th International Workshop on Information Security Applications, WISA 2005
CountryKorea, Republic of
CityJeju Island
Period05/8/2205/8/24

Keywords

  • Anonymity
  • Conjunctive Keyword Search
  • Oblivious Transfer
  • Privacy
  • Storage system

ASJC Scopus subject areas

  • Theoretical Computer Science
  • Computer Science(all)

Fingerprint Dive into the research topics of 'Oblivious conjunctive keyword search'. Together they form a unique fingerprint.

Cite this