Keyword field-free conjunctive keyword searches on encrypted data and extension for dynamic groups

Peishun Wang*, Huaxiong Wang, Josef Pieprzyk

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionpeer-review

47 Citations (Scopus)

Abstract

We consider the following problem: a user stores encrypted documents on an untrusted server, and wishes to retrieve all documents containing some keywords without any loss of data confidentiality. Conjunctive keyword searches on encrypted data have been studied by numerous researchers over the past few years, and all existing schemes use keyword fields as compulsory information. This however is impractical for many applications. In this paper, we propose a scheme of keyword field-free conjunctive keyword searches on encrypted data, which affirmatively answers an open problem asked by Golle et al. at ACNS 2004. Furthermore, the proposed scheme is extended to the dynamic group setting. Security analysis of our constructions is given in the paper.

Original languageEnglish
Title of host publicationCryptology and Network Security
Subtitle of host publication7th International Conference, CANS 2008, Hong-Kong, China, December 2-4, 2008. Proceedings
EditorsMatthew K. Franklin, Lucas Chi Kwong Hui, Duncan S. Wong
Place of PublicationBerlin
PublisherSpringer, Springer Nature
Pages178-195
Number of pages18
ISBN (Electronic)9783540896418
ISBN (Print)9783540896401
DOIs
Publication statusPublished - 2008
Event7th International Conference on Cryptology and Network Security, CANS 2008 - Hong-Kong, China
Duration: 2 Dec 20084 Dec 2008

Publication series

NameLecture Notes in Computer Science
PublisherSpringer Berlin Heidelberg
Volume5339
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Other

Other7th International Conference on Cryptology and Network Security, CANS 2008
CountryChina
CityHong-Kong
Period2/12/084/12/08

Fingerprint

Dive into the research topics of 'Keyword field-free conjunctive keyword searches on encrypted data and extension for dynamic groups'. Together they form a unique fingerprint.

Cite this