Public Key Encryption with distributed Keyword Search

Veronika Kuchta, Mark Manulis

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearch

3 Citations (Scopus)


In this paper we introduce Threshold Public Key Encryption with Keyword Search (TPEKS), a variant of PEKS where the search procedure for encrypted keywords is distributed across multiple servers in a threshold manner. TPEKS schemes offer stronger privacy protection for keywords in comparison to traditional PEKS schemes. In particularly, they prevent keyword guessing attacks by malicious servers. This protection is not achievable in a single-server PEKS setting. We show how TPEKS can be built generically from any anonymous Identity-Based Threshold Decryption (IBTD), assuming the latter is indistinguishable, anonymous and robust. In order to instantiate our TPEKS construction we describe an efficient IBTD variant of the Boneh-Franklin IBE scheme. We provide an appropriate security model for such IBTD schemes and give an efficient construction in the random oracle model. TPEKS constructions are particularly useful in distributed cloud storage systems where none of the servers alone is sufficiently trusted to perform the search procedure and where there is a need to split this functionality across multiple servers to enhance security and reliability.

Original languageEnglish
Title of host publicationTrusted Systems
Subtitle of host publication7th International Conference, INTRUST 2015 Beijing, China, December 7–8, 2015 Revised Selected Papers
EditorsMoti Yung, Jianbiao Zhang, Zhen Yang
Place of PublicationCham Switzerland
Number of pages22
ISBN (Electronic)9783319315508
ISBN (Print)9783319315492
Publication statusPublished - 2016
Externally publishedYes
EventInternational Conference on the Theory, Technologies and Applications of Trusted Systems 2015 - Beijing, China
Duration: 7 Dec 20158 Dec 2015
Conference number: 7th

Publication series

NameLecture Notes in Computer Science
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349


ConferenceInternational Conference on the Theory, Technologies and Applications of Trusted Systems 2015
Abbreviated titleINTRUST 2015
Internet address

Cite this