Mobile Networks and Management. 9th International Conference, MONAMI 2017, Melbourne, Australia, December 13-15, 2017, Proceedings

Research Article

The Public Verifiability of Public Key Encryption with Keyword Search

Download56 downloads
  • @INPROCEEDINGS{10.1007/978-3-319-90775-8_24,
        author={Binrui Zhu and Jiameng Sun and Jing Qin and Jixin Ma},
        title={The Public Verifiability of Public Key Encryption with Keyword Search},
        proceedings={Mobile Networks and Management. 9th International Conference, MONAMI 2017, Melbourne, Australia, December 13-15, 2017, Proceedings},
        proceedings_a={MONAMI},
        year={2018},
        month={5},
        keywords={Cloud computing PEKS Public verifiability Indistinguishability},
        doi={10.1007/978-3-319-90775-8_24}
    }
    
  • Binrui Zhu
    Jiameng Sun
    Jing Qin
    Jixin Ma
    Year: 2018
    The Public Verifiability of Public Key Encryption with Keyword Search
    MONAMI
    Springer
    DOI: 10.1007/978-3-319-90775-8_24
Binrui Zhu1,*, Jiameng Sun1,*, Jing Qin,*, Jixin Ma2,*
  • 1: Shandong University
  • 2: University of Greenwich
*Contact email: zhubinrui1509889@163.com, sunjiameng1991@163.com, qinjing@sdu.edu.cn, j.ma@greenwich.ac.uk

Abstract

Cloud computing has been widely recognized as the next big thing in this era. Users outsourced data to cloud server and cloud server provided service economic savings and various convenience for users. Public key encryption with keyword search (PEKS) which provides a solution for a third party user to search on remote data encrypted by data owner. Since the server may be dishonest, it can perform search operation on encrypted data and only return partial results. Therefore, it is necessary to verify the correctness and completeness of the search result. Existing PEKS schemes only support data receiver’s private verification, however, in practice, we usually need anyone can verify the server’s search result. In this paper, we propose a PEKS with public verifiability scheme, which can achieve the security of ciphertext indistinguishability, trapdoor indistinguishability, keyword guessing attack and public verifiability. Comparing previous PEKS schemes, our scheme is public verifiability, while keeping the encrypted data security in cloud server and search operation privately over the encrypted data.