Efficient searchable ID-based encryption with a designated server

Tsu Yang Wu, Tung Tso Tsai, Yuh-Min Tseng

Research output: Contribution to journalArticle

34 Citations (Scopus)

Abstract

Public key encryption with keyword search (PEKS) is a mechanism that allows one to extract e-mails containing a particular keyword by providing a trapdoor corresponding to the keyword. And parties without the trapdoor are unable to learn any information about the extracted e-mails. Meanwhile, a PEKS scheme is also suitable to provide a secure storage system in cloud computing environment. However, in a PEKS scheme, a secure channel must be established to transmit trapdoors. A PEKS scheme with a designated server, termed dPEKS, removes the requirement of the secure channel while retaining the same functionality of PEKS. Up to date, the related studies on dPEKS are all based on the pairing-based public key system. No work focuses on dPEKS based on ID-based systems, termed dIBEKS. In this article, we propose the first dIBEKS scheme that possesses the advantage (removing certificate management) of ID-based systems. Security analysis is given to demonstrate that our scheme is provably secure and can resist off-line keyword guessing attacks. When compared with previously proposed dPEKS schemes, our scheme has better performance in terms of computational time.

Original languageEnglish
Pages (from-to)391-402
Number of pages12
JournalAnnales des Telecommunications/Annals of Telecommunications
Volume69
Issue number7-8
DOIs
Publication statusPublished - 2014 Jan 1

Fingerprint

Cryptography
Servers
Cloud computing

All Science Journal Classification (ASJC) codes

  • Electrical and Electronic Engineering

Cite this

@article{615948245edc45b3b741415bacd0331b,
title = "Efficient searchable ID-based encryption with a designated server",
abstract = "Public key encryption with keyword search (PEKS) is a mechanism that allows one to extract e-mails containing a particular keyword by providing a trapdoor corresponding to the keyword. And parties without the trapdoor are unable to learn any information about the extracted e-mails. Meanwhile, a PEKS scheme is also suitable to provide a secure storage system in cloud computing environment. However, in a PEKS scheme, a secure channel must be established to transmit trapdoors. A PEKS scheme with a designated server, termed dPEKS, removes the requirement of the secure channel while retaining the same functionality of PEKS. Up to date, the related studies on dPEKS are all based on the pairing-based public key system. No work focuses on dPEKS based on ID-based systems, termed dIBEKS. In this article, we propose the first dIBEKS scheme that possesses the advantage (removing certificate management) of ID-based systems. Security analysis is given to demonstrate that our scheme is provably secure and can resist off-line keyword guessing attacks. When compared with previously proposed dPEKS schemes, our scheme has better performance in terms of computational time.",
author = "Wu, {Tsu Yang} and Tsai, {Tung Tso} and Yuh-Min Tseng",
year = "2014",
month = "1",
day = "1",
doi = "10.1007/s12243-013-0398-z",
language = "English",
volume = "69",
pages = "391--402",
journal = "Annales des Telecommunications",
issn = "0003-4347",
publisher = "Springer Paris",
number = "7-8",

}

Efficient searchable ID-based encryption with a designated server. / Wu, Tsu Yang; Tsai, Tung Tso; Tseng, Yuh-Min.

In: Annales des Telecommunications/Annals of Telecommunications, Vol. 69, No. 7-8, 01.01.2014, p. 391-402.

Research output: Contribution to journalArticle

TY - JOUR

T1 - Efficient searchable ID-based encryption with a designated server

AU - Wu, Tsu Yang

AU - Tsai, Tung Tso

AU - Tseng, Yuh-Min

PY - 2014/1/1

Y1 - 2014/1/1

N2 - Public key encryption with keyword search (PEKS) is a mechanism that allows one to extract e-mails containing a particular keyword by providing a trapdoor corresponding to the keyword. And parties without the trapdoor are unable to learn any information about the extracted e-mails. Meanwhile, a PEKS scheme is also suitable to provide a secure storage system in cloud computing environment. However, in a PEKS scheme, a secure channel must be established to transmit trapdoors. A PEKS scheme with a designated server, termed dPEKS, removes the requirement of the secure channel while retaining the same functionality of PEKS. Up to date, the related studies on dPEKS are all based on the pairing-based public key system. No work focuses on dPEKS based on ID-based systems, termed dIBEKS. In this article, we propose the first dIBEKS scheme that possesses the advantage (removing certificate management) of ID-based systems. Security analysis is given to demonstrate that our scheme is provably secure and can resist off-line keyword guessing attacks. When compared with previously proposed dPEKS schemes, our scheme has better performance in terms of computational time.

AB - Public key encryption with keyword search (PEKS) is a mechanism that allows one to extract e-mails containing a particular keyword by providing a trapdoor corresponding to the keyword. And parties without the trapdoor are unable to learn any information about the extracted e-mails. Meanwhile, a PEKS scheme is also suitable to provide a secure storage system in cloud computing environment. However, in a PEKS scheme, a secure channel must be established to transmit trapdoors. A PEKS scheme with a designated server, termed dPEKS, removes the requirement of the secure channel while retaining the same functionality of PEKS. Up to date, the related studies on dPEKS are all based on the pairing-based public key system. No work focuses on dPEKS based on ID-based systems, termed dIBEKS. In this article, we propose the first dIBEKS scheme that possesses the advantage (removing certificate management) of ID-based systems. Security analysis is given to demonstrate that our scheme is provably secure and can resist off-line keyword guessing attacks. When compared with previously proposed dPEKS schemes, our scheme has better performance in terms of computational time.

UR - http://www.scopus.com/inward/record.url?scp=84904563413&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84904563413&partnerID=8YFLogxK

U2 - 10.1007/s12243-013-0398-z

DO - 10.1007/s12243-013-0398-z

M3 - Article

VL - 69

SP - 391

EP - 402

JO - Annales des Telecommunications

JF - Annales des Telecommunications

SN - 0003-4347

IS - 7-8

ER -