Searchable Encryption for Dynamic group in Undesignated Receiver Settings
- 주제(키워드) multi-user setting , encrypted database , keyword search
- 발행기관 고려대학교 정보경영공학전문대학원
- 지도교수 정익래
- 발행년도 2011
- 학위수여년월 2011. 2
- 학위구분 석사
- 학과 정보경영공학전문대학원 정보경영공학과
- 원문페이지 50 p
- 실제URI http://www.dcollection.net/handler/korea/000000024514
- 본문언어 영어
- 제출원본 000045640673
초록/요약
To securely share the data between users, encryption schemes with keyword search in various settings have been suggested. In the designated receiver setting, a data owner should specify which receivers could download the data in advance at the time the owner uploads its data. In this designated receiver setting, the other undesignated receivers cannot download the data. In the undesignated receiver setting, a data owner uploads its data without specifying the receivers. Then, any receiver can do keyword search and receive the matching data. In this undesignated receiver setting, the user-revocability is very important to prevent the unauthorized users from getting the data. However, the previous scheme is not secure against the revoked users. That is, a revoked user can decrypt the transferred ciphertexts between the server and the authorized users in the previous scheme. Moreover, the previous scheme does not provide unlinkability. In the paper, we suggest a secure searchable encryption scheme with user revocability in the undesignated receiver setting. Our scheme is the first secure searchable encryption scheme for dynamic group in the undesignated receiver setting. Our scheme also provides unlinkability.
more목차
1 Introduction
2 Preliminaries
2.1 Pseudorandom Function and Pseudorandom Permutation
2.2 Bilinear Groups
2.3 The BLS Signature Scheme
3 System and Security Models
3.1 System Model
3.2 Security Model
4 Related Works
4.1 Song et al.'s Scheme
4.1.1 Background and Definitions
4.1.2 Song et al.'s Scheme
First scheme : The Basic scheme
Second scheme : Controlled searching
Third scheme : Support for Hidden Search
Final Scheme
4.1.3 Analysis
4.2 Bao et al.'s Scheme
4.2.1 Bao et al.'s Scheme
4.2.2 Analysis
5 Secure Searchable Encryption Scheme with User-Revocability
5.1 Construction
5.2 Correctness
5.3 Security Proof
6 Conclusion

