Trapdoor security in a searchable public-key encryption scheme with a designated tester
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Rhee, Hyun Sook | - |
dc.contributor.author | Park, Jong Hwan | - |
dc.contributor.author | Susilo, Willy | - |
dc.contributor.author | Lee, Dong Hoon | - |
dc.date.accessioned | 2021-09-08T03:28:59Z | - |
dc.date.available | 2021-09-08T03:28:59Z | - |
dc.date.created | 2021-06-11 | - |
dc.date.issued | 2010-05 | - |
dc.identifier.issn | 0164-1212 | - |
dc.identifier.uri | https://scholar.korea.ac.kr/handle/2021.sw.korea/116527 | - |
dc.description.abstract | We study a secure searchable public-key encryption scheme with a designated tester (dPEKS). The contributions of this paper are threefold. First, we enhance the existing security model to incorporate the realistic abilities of dPEKS attackers. Second, we introduce the concept of "trapdoor indistinguishability" and show that trapdoor indistinguishability is a sufficient condition for thwarting keyword-guessing attacks. This answers the open problem of how to construct PEKS (dPEKS) schemes that are provably secure against keyword-guessing attacks. Finally, we propose a dPEKS scheme that is secure in the enhanced security model. The scheme is the first dPEKS scheme that is secure against keyword-guessing attacks. (C) 2009 Elsevier Inc. All rights reserved. | - |
dc.language | English | - |
dc.language.iso | en | - |
dc.publisher | ELSEVIER SCIENCE INC | - |
dc.subject | CONJUNCTIVE KEYWORD SEARCH | - |
dc.title | Trapdoor security in a searchable public-key encryption scheme with a designated tester | - |
dc.type | Article | - |
dc.contributor.affiliatedAuthor | Rhee, Hyun Sook | - |
dc.contributor.affiliatedAuthor | Lee, Dong Hoon | - |
dc.identifier.doi | 10.1016/j.jss.2009.11.726 | - |
dc.identifier.scopusid | 2-s2.0-77649179760 | - |
dc.identifier.wosid | 000276535500004 | - |
dc.identifier.bibliographicCitation | JOURNAL OF SYSTEMS AND SOFTWARE, v.83, no.5, pp.763 - 771 | - |
dc.relation.isPartOf | JOURNAL OF SYSTEMS AND SOFTWARE | - |
dc.citation.title | JOURNAL OF SYSTEMS AND SOFTWARE | - |
dc.citation.volume | 83 | - |
dc.citation.number | 5 | - |
dc.citation.startPage | 763 | - |
dc.citation.endPage | 771 | - |
dc.type.rims | ART | - |
dc.type.docType | Article | - |
dc.description.journalClass | 1 | - |
dc.description.journalRegisteredClass | scie | - |
dc.description.journalRegisteredClass | scopus | - |
dc.relation.journalResearchArea | Computer Science | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Software Engineering | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Theory & Methods | - |
dc.subject.keywordPlus | CONJUNCTIVE KEYWORD SEARCH | - |
dc.subject.keywordAuthor | Keyword search on encrypted data | - |
dc.subject.keywordAuthor | Designated tester | - |
dc.subject.keywordAuthor | Data security | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
145 Anam-ro, Seongbuk-gu, Seoul, 02841, Korea+82-2-3290-2963
COPYRIGHT © 2021 Korea University. All Rights Reserved.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.