Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

Searchable Encryption with Keyword-Recoverability

Full metadata record
DC Field Value Language
dc.contributor.authorJeong, Ik Rae-
dc.contributor.authorKwon, Jeong Ok-
dc.contributor.authorHong, Dowon-
dc.contributor.authorLee, Dong Hoon-
dc.date.accessioned2021-09-08T17:27:08Z-
dc.date.available2021-09-08T17:27:08Z-
dc.date.created2021-06-10-
dc.date.issued2009-05-
dc.identifier.issn0916-8532-
dc.identifier.urihttps://scholar.korea.ac.kr/handle/2021.sw.korea/120091-
dc.description.abstractSearchable encryption has many applications including e-mail systems and storage systems. The usefulness of searchable encryption derives from its support of keyword-testability. Keyword-testability means that a receiver of a ciphertext can test whether the ciphertext contains a specific keyword. Recently, Bellare et al. suggested an efficiently-searchable encryption scheme with keyword-recoverability as well as keyword-testability. Keyword-recoverability means that a receiver can extract the keyword from a ciphertext. All of the previous searchable encryption schemes have provided only keyword-testability. However, as explained by Bellare et al., no efficiently-search able encryption scheme can provide even security against chosen keyword attacks. That is, Bellare et al.'s scheme assumes that no useful partial information about the keyword is known to the adversaries. In this paper, we suggest an SEKR (searchable encryption with keyword-recoverability) scheme which is secure even if the adversaries have any useful partial information about the keyword. Our scheme provides security against chosen ciphertext attacks which are stronger attacks than chosen keyword attacks. We also suggest an SEKR scheme for multi-keywords.-
dc.languageEnglish-
dc.language.isoen-
dc.publisherIEICE-INST ELECTRONICS INFORMATION COMMUNICATIONS ENG-
dc.subjectPUBLIC-KEY ENCRYPTION-
dc.titleSearchable Encryption with Keyword-Recoverability-
dc.typeArticle-
dc.contributor.affiliatedAuthorJeong, Ik Rae-
dc.contributor.affiliatedAuthorLee, Dong Hoon-
dc.identifier.doi10.1587/transinf.E92.D.1200-
dc.identifier.scopusid2-s2.0-77950317505-
dc.identifier.wosid000266425700047-
dc.identifier.bibliographicCitationIEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, v.E92D, no.5, pp.1200 - 1203-
dc.relation.isPartOfIEICE TRANSACTIONS ON INFORMATION AND SYSTEMS-
dc.citation.titleIEICE TRANSACTIONS ON INFORMATION AND SYSTEMS-
dc.citation.volumeE92D-
dc.citation.number5-
dc.citation.startPage1200-
dc.citation.endPage1203-
dc.type.rimsART-
dc.type.docTypeArticle-
dc.description.journalClass1-
dc.description.journalRegisteredClassscie-
dc.description.journalRegisteredClassscopus-
dc.relation.journalResearchAreaComputer Science-
dc.relation.journalWebOfScienceCategoryComputer Science, Information Systems-
dc.relation.journalWebOfScienceCategoryComputer Science, Software Engineering-
dc.subject.keywordPlusPUBLIC-KEY ENCRYPTION-
dc.subject.keywordAuthorkeyword search-
dc.subject.keywordAuthorkeyword-testability-
dc.subject.keywordAuthorkeyword-recoverability-
dc.subject.keywordAuthordata-recoverability-
dc.subject.keywordAuthorchosen ciphertext attacks-
Files in This Item
There are no files associated with this item.
Appears in
Collections
School of Cyber Security > Department of Information Security > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher Lee, Dong Hoon photo

Lee, Dong Hoon
정보보호학과
Read more

Altmetrics

Total Views & Downloads

BROWSE