Threshold privacy preserving keyword searches

Peishun Wang*, Huaxiong Wang, Josef Pieprzyk

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

33 Citations (Scopus)

Abstract

We consider the following problem: users of an organization wish to outsource the storage of sensitive data to a large database server. It is assumed that the server storing the data is untrusted so the data stored have to be encrypted. We further suppose that the manager of the organization has the right to access all data, but a member of the organization can not access any data alone. The member must collaborate with other members to search for the desired data. In this paper, we investigate the notion of threshold privacy preserving keyword search (TPPKS) and define its security requirements. We construct a TPPKS scheme and show the proof of security under the assumptions of intractability of discrete logarithm, decisional Diffie-Hellman and computational Diffie-Hellman problems.

Original languageEnglish
Title of host publicationSOFSEM 2008: Theory and Practice of Computer Science
Subtitle of host publication34th Conference on Current Trends in Theory and Practice of Computer Science, Nový Smokovec, Slovakia, January 19-25, 2008. Proceedings
EditorsViliam Geffert, Juhani Karhumäki, Alberto Bertoni, Bart Preneel, Pavol Návrat, Mária Bieliková
Place of PublicationBerlin
PublisherSpringer, Springer Nature
Pages646-658
Number of pages13
ISBN (Electronic)9783540775669
ISBN (Print)9783540775652
DOIs
Publication statusPublished - 2008
EventSOFSEM 2008 - 34th Conference on Current Trends in Theory and Practice of Computer Science - Novy Smokovec, Slovakia
Duration: 19 Jan 200825 Jan 2008

Publication series

NameLecture Notes in Computer Science
PublisherSpringer Berlin Heidelberg
Volume4910
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Other

OtherSOFSEM 2008 - 34th Conference on Current Trends in Theory and Practice of Computer Science
CountrySlovakia
CityNovy Smokovec
Period19/01/0825/01/08

Fingerprint

Dive into the research topics of 'Threshold privacy preserving keyword searches'. Together they form a unique fingerprint.

Cite this