Public Key Encryption with Keyword Search for Restricted Testability
- 주제(키워드) Keyword search on encrypted data , Database security and privacy , Keyword guessing attack
- 발행기관 고려대학교 정보보호대학원
- 지도교수 이동훈
- 발행년도 2012
- 학위수여년월 2012. 2
- 학위구분 석사
- 학과 정보보호대학원 정보보호학과
- 원문페이지 51 p
- 실제URI http://www.dcollection.net/handler/korea/000000032739
- 본문언어 영어
- 제출원본 000045697504
초록/요약
To provide efficient keyword search on encrypted data, public key encryption with keyword search (PEKS) was proposed by Boneh et al. A sender encrypts an e-mail and keywords with the receiver's public key, respectively and uploads them on a server. Then the receiver generates a trapdoor of W with his private key to search an e-mail related with some keyword W. However, Byun et al. showed that PEKS and some related schemes are not secure against off-line keyword guessing attacks. In this paper, we propose a public key encryption scheme with keyword search for restricted testability (PEKS-RT) and show that our scheme is secure against keyword guessing attack.
more목차
1 Introduction 1
1.1 Related Works . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
2 Preliminaries 7
2.1 Bilinear Maps . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
2.2 Bilinear Diffie-Hellman Assumption . . . . . . . . . . . . . . . 8
3 System and Security Models 9
3.1 System Model . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
3.2 Security Model . . . . . . . . . . . . . . . . . . . . . . . . . . 11
4 Related Works 15
4.1 Boneh et al.'s Scheme [4] . . . . . . . . . . . . . . . . . . . . . 15
4.2 Park et al.'s Scheme [12] . . . . . . . . . . . . . . . . . . . . . 17
4.3 Byun et al.'s Off-Line Keyword Guessing Attack [7] . . . . . . 20
4.3.1 Keyword Guessing Attack on Boneh et al.'s scheme . . 21
4.3.2 Keyword Guessing Attack on Park et al.'s scheme . . . 22
4.3.3 Analysis . . . . . . . . . . . . . . . . . . . . . . . . . . 23
5 Public Key Encryption with Keyword Search for Restricted Testability 24
5.1 Construction . . . . . . . . . . . . . . . . . . . . . . . . . . . 24
5.2 Security Proof . . . . . . . . . . . . . . . . . . . . . . . . . . . 26
6 Discussion 36
6.1 PECK-RT scheme . . . . . . . . . . . . . . . . . . . . . . . . . 37
7 Conclusion 41

