The Community for Technology Leaders
Green Image
Issue No. 11 - Nov. (2013 vol. 62)
ISSN: 0018-9340
pp: 2266-2277
Peng Xu , Huazhong University of Science and Technology, Wuhan
Hai Jin , Huazhong University of Science and Technology, Wuhan
Qianhong Wu , Beihang Univerisity, Beijing
Wei Wang , Peking University, Shenzhen
ABSTRACT
Public-key encryption with keyword search (PEKS) is a versatile tool. It allows a third party knowing the search trapdoor of a keyword to search encrypted documents containing that keyword without decrypting the documents or knowing the keyword. However, it is shown that the keyword will be compromised by a malicious third party under a keyword guess attack (KGA) if the keyword space is in a polynomial size. We address this problem with a keyword privacy enhanced variant of PEKS referred to as public-key encryption with fuzzy keyword search (PEFKS). In PEFKS, each keyword corresponds to an exact keyword search trapdoor and a fuzzy keyword search trapdoor. Two or more keywords share the same fuzzy keyword trapdoor. To search encrypted documents containing a specific keyword, only the fuzzy keyword search trapdoor is provided to the third party, i.e., the searcher. Thus, in PEFKS, a malicious searcher can no longer learn the exact keyword to be searched even if the keyword space is small. We propose a universal transformation which converts any anonymous identity-based encryption (IBE) scheme into a secure PEFKS scheme. Following the generic construction, we instantiate the first PEFKS scheme proven to be secure under KGA in the case that the keyword space is in a polynomial size.
INDEX TERMS
Keyword search, Receivers, Encryption, Servers, Public key,identity-based encryption, Public-key encryption with keyword search, keyword guessing attack, public-key encryption with fuzzy keyword search
CITATION
Peng Xu, Hai Jin, Qianhong Wu, Wei Wang, "Public-Key Encryption with Fuzzy Keyword Search: A Provably Secure Scheme under Keyword Guessing Attack", IEEE Transactions on Computers, vol. 62, no. , pp. 2266-2277, Nov. 2013, doi:10.1109/TC.2012.215
297 ms
(Ver )