Secure index search for groups

Hyun A. Park, Jin Wook Byun, Dong Hoon Lee

Research output: Chapter in Book/Report/Conference proceedingConference contribution

14 Citations (Scopus)


A secure index search protocol makes it possible to search for the index of encrypted documents using specified keywords even without decrypting them. An untrusted server storing the documents learns nothing more than the search result about the documents without revealing the keyword. Secure index search protocols in the literature only consider a search process between a single-user and a server. However, in real organizations such as government offices or enterprises with many departments, a group search occurs more often. In this paper, we study natural extension of previous results, i.e., secure index search between a server and group members, where a file may be shared by a group or a person with a server. The difficulty in designing such a group setting arises from dynamic group, where each member of the group may join to or leave from the group. To resolve this difficulty efficiently, we propose novel secure index search protocols without reencryption of the old encrypted documents when group keys are updated.

Original languageEnglish
Title of host publicationLecture Notes in Computer Science
EditorsS. Katsikas, J. Lopez, G. Pernul
Number of pages13
Publication statusPublished - 2005
EventSecond International Conference on Trust, Privacy and Security in Digital Business, TrustBus 2005 - Copenhagen, Denmark
Duration: 2005 Aug 222005 Aug 26


OtherSecond International Conference on Trust, Privacy and Security in Digital Business, TrustBus 2005


  • Database
  • Hierarchical group
  • Index search
  • Keyword
  • Privacy

ASJC Scopus subject areas

  • Computer Science (miscellaneous)

Fingerprint Dive into the research topics of 'Secure index search for groups'. Together they form a unique fingerprint.

  • Cite this

    Park, H. A., Byun, J. W., & Lee, D. H. (2005). Secure index search for groups. In S. Katsikas, J. Lopez, & G. Pernul (Eds.), Lecture Notes in Computer Science (Vol. 3592, pp. 128-140)