Research Article
The Public Verifiability of Public Key Encryption with Keyword Search
@INPROCEEDINGS{10.1007/978-3-319-90775-8_24, author={Binrui Zhu and Jiameng Sun and Jing Qin and Jixin Ma}, title={The Public Verifiability of Public Key Encryption with Keyword Search}, proceedings={Mobile Networks and Management. 9th International Conference, MONAMI 2017, Melbourne, Australia, December 13-15, 2017, Proceedings}, proceedings_a={MONAMI}, year={2018}, month={5}, keywords={Cloud computing PEKS Public verifiability Indistinguishability}, doi={10.1007/978-3-319-90775-8_24} }
- Binrui Zhu
Jiameng Sun
Jing Qin
Jixin Ma
Year: 2018
The Public Verifiability of Public Key Encryption with Keyword Search
MONAMI
Springer
DOI: 10.1007/978-3-319-90775-8_24
Abstract
Cloud computing has been widely recognized as the next big thing in this era. Users outsourced data to cloud server and cloud server provided service economic savings and various convenience for users. Public key encryption with keyword search (PEKS) which provides a solution for a third party user to search on remote data encrypted by data owner. Since the server may be dishonest, it can perform search operation on encrypted data and only return partial results. Therefore, it is necessary to verify the correctness and completeness of the search result. Existing PEKS schemes only support data receiver’s private verification, however, in practice, we usually need anyone can verify the server’s search result. In this paper, we propose a PEKS with public verifiability scheme, which can achieve the security of ciphertext indistinguishability, trapdoor indistinguishability, keyword guessing attack and public verifiability. Comparing previous PEKS schemes, our scheme is public verifiability, while keeping the encrypted data security in cloud server and search operation privately over the encrypted data.