Public Key Encryption with distributed Keyword Search

Veronika Kuchta, Mark Manulis

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearch

2 Citations (Scopus)

Abstract

In this paper we introduce Threshold Public Key Encryption with Keyword Search (TPEKS), a variant of PEKS where the search procedure for encrypted keywords is distributed across multiple servers in a threshold manner. TPEKS schemes offer stronger privacy protection for keywords in comparison to traditional PEKS schemes. In particularly, they prevent keyword guessing attacks by malicious servers. This protection is not achievable in a single-server PEKS setting. We show how TPEKS can be built generically from any anonymous Identity-Based Threshold Decryption (IBTD), assuming the latter is indistinguishable, anonymous and robust. In order to instantiate our TPEKS construction we describe an efficient IBTD variant of the Boneh-Franklin IBE scheme. We provide an appropriate security model for such IBTD schemes and give an efficient construction in the random oracle model. TPEKS constructions are particularly useful in distributed cloud storage systems where none of the servers alone is sufficiently trusted to perform the search procedure and where there is a need to split this functionality across multiple servers to enhance security and reliability.

Original languageEnglish
Title of host publicationTrusted Systems
Subtitle of host publication7th International Conference, INTRUST 2015 Beijing, China, December 7–8, 2015 Revised Selected Papers
EditorsMoti Yung, Jianbiao Zhang, Zhen Yang
Place of PublicationCham Switzerland
PublisherSpringer
Pages62-83
Number of pages22
ISBN (Electronic)9783319315508
ISBN (Print)9783319315492
DOIs
Publication statusPublished - 2016
Externally publishedYes
EventInternational Conference on the Theory, Technologies and Applications of Trusted Systems 2015 - Beijing, China
Duration: 7 Dec 20158 Dec 2015
Conference number: 7th
http://www.onets.com.cn/intrust2015/

Publication series

NameLecture Notes in Computer Science
PublisherSpringer
Volume9565
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

ConferenceInternational Conference on the Theory, Technologies and Applications of Trusted Systems 2015
Abbreviated titleINTRUST 2015
CountryChina
CityBeijing
Period7/12/158/12/15
Internet address

Cite this

Kuchta, V., & Manulis, M. (2016). Public Key Encryption with distributed Keyword Search. In M. Yung, J. Zhang, & Z. Yang (Eds.), Trusted Systems: 7th International Conference, INTRUST 2015 Beijing, China, December 7–8, 2015 Revised Selected Papers (pp. 62-83). (Lecture Notes in Computer Science; Vol. 9565). Cham Switzerland: Springer. https://doi.org/10.1007/978-3-319-31550-8_5
Kuchta, Veronika ; Manulis, Mark. / Public Key Encryption with distributed Keyword Search. Trusted Systems: 7th International Conference, INTRUST 2015 Beijing, China, December 7–8, 2015 Revised Selected Papers. editor / Moti Yung ; Jianbiao Zhang ; Zhen Yang. Cham Switzerland : Springer, 2016. pp. 62-83 (Lecture Notes in Computer Science).
@inproceedings{c7a96e56f5844b85a0548d7b753aa5cb,
title = "Public Key Encryption with distributed Keyword Search",
abstract = "In this paper we introduce Threshold Public Key Encryption with Keyword Search (TPEKS), a variant of PEKS where the search procedure for encrypted keywords is distributed across multiple servers in a threshold manner. TPEKS schemes offer stronger privacy protection for keywords in comparison to traditional PEKS schemes. In particularly, they prevent keyword guessing attacks by malicious servers. This protection is not achievable in a single-server PEKS setting. We show how TPEKS can be built generically from any anonymous Identity-Based Threshold Decryption (IBTD), assuming the latter is indistinguishable, anonymous and robust. In order to instantiate our TPEKS construction we describe an efficient IBTD variant of the Boneh-Franklin IBE scheme. We provide an appropriate security model for such IBTD schemes and give an efficient construction in the random oracle model. TPEKS constructions are particularly useful in distributed cloud storage systems where none of the servers alone is sufficiently trusted to perform the search procedure and where there is a need to split this functionality across multiple servers to enhance security and reliability.",
author = "Veronika Kuchta and Mark Manulis",
year = "2016",
doi = "10.1007/978-3-319-31550-8_5",
language = "English",
isbn = "9783319315492",
series = "Lecture Notes in Computer Science",
publisher = "Springer",
pages = "62--83",
editor = "Moti Yung and Jianbiao Zhang and Zhen Yang",
booktitle = "Trusted Systems",

}

Kuchta, V & Manulis, M 2016, Public Key Encryption with distributed Keyword Search. in M Yung, J Zhang & Z Yang (eds), Trusted Systems: 7th International Conference, INTRUST 2015 Beijing, China, December 7–8, 2015 Revised Selected Papers. Lecture Notes in Computer Science, vol. 9565, Springer, Cham Switzerland, pp. 62-83, International Conference on the Theory, Technologies and Applications of Trusted Systems 2015, Beijing, China, 7/12/15. https://doi.org/10.1007/978-3-319-31550-8_5

Public Key Encryption with distributed Keyword Search. / Kuchta, Veronika; Manulis, Mark.

Trusted Systems: 7th International Conference, INTRUST 2015 Beijing, China, December 7–8, 2015 Revised Selected Papers. ed. / Moti Yung; Jianbiao Zhang; Zhen Yang. Cham Switzerland : Springer, 2016. p. 62-83 (Lecture Notes in Computer Science; Vol. 9565).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearch

TY - GEN

T1 - Public Key Encryption with distributed Keyword Search

AU - Kuchta, Veronika

AU - Manulis, Mark

PY - 2016

Y1 - 2016

N2 - In this paper we introduce Threshold Public Key Encryption with Keyword Search (TPEKS), a variant of PEKS where the search procedure for encrypted keywords is distributed across multiple servers in a threshold manner. TPEKS schemes offer stronger privacy protection for keywords in comparison to traditional PEKS schemes. In particularly, they prevent keyword guessing attacks by malicious servers. This protection is not achievable in a single-server PEKS setting. We show how TPEKS can be built generically from any anonymous Identity-Based Threshold Decryption (IBTD), assuming the latter is indistinguishable, anonymous and robust. In order to instantiate our TPEKS construction we describe an efficient IBTD variant of the Boneh-Franklin IBE scheme. We provide an appropriate security model for such IBTD schemes and give an efficient construction in the random oracle model. TPEKS constructions are particularly useful in distributed cloud storage systems where none of the servers alone is sufficiently trusted to perform the search procedure and where there is a need to split this functionality across multiple servers to enhance security and reliability.

AB - In this paper we introduce Threshold Public Key Encryption with Keyword Search (TPEKS), a variant of PEKS where the search procedure for encrypted keywords is distributed across multiple servers in a threshold manner. TPEKS schemes offer stronger privacy protection for keywords in comparison to traditional PEKS schemes. In particularly, they prevent keyword guessing attacks by malicious servers. This protection is not achievable in a single-server PEKS setting. We show how TPEKS can be built generically from any anonymous Identity-Based Threshold Decryption (IBTD), assuming the latter is indistinguishable, anonymous and robust. In order to instantiate our TPEKS construction we describe an efficient IBTD variant of the Boneh-Franklin IBE scheme. We provide an appropriate security model for such IBTD schemes and give an efficient construction in the random oracle model. TPEKS constructions are particularly useful in distributed cloud storage systems where none of the servers alone is sufficiently trusted to perform the search procedure and where there is a need to split this functionality across multiple servers to enhance security and reliability.

UR - http://www.scopus.com/inward/record.url?scp=84962298314&partnerID=8YFLogxK

U2 - 10.1007/978-3-319-31550-8_5

DO - 10.1007/978-3-319-31550-8_5

M3 - Conference Paper

SN - 9783319315492

T3 - Lecture Notes in Computer Science

SP - 62

EP - 83

BT - Trusted Systems

A2 - Yung, Moti

A2 - Zhang, Jianbiao

A2 - Yang, Zhen

PB - Springer

CY - Cham Switzerland

ER -

Kuchta V, Manulis M. Public Key Encryption with distributed Keyword Search. In Yung M, Zhang J, Yang Z, editors, Trusted Systems: 7th International Conference, INTRUST 2015 Beijing, China, December 7–8, 2015 Revised Selected Papers. Cham Switzerland: Springer. 2016. p. 62-83. (Lecture Notes in Computer Science). https://doi.org/10.1007/978-3-319-31550-8_5