Oblivious keyword search with authorization

Peng Jiang*, Xiaofen Wang, Jianchang Lai, Fuchun Guo, Rongmao Chen

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

6 Citations (Scopus)

Abstract

Oblivious keyword search (OKS) allows a user to search and retrieve the data associated with a chosen keyword in an oblivious way. The database supplier issues a trapdoor (used for searching) of a specific keyword chosen by the user while learns nothing about this keyword. In this paper, we propose a new cryptographic primitive called oblivious keyword search with authorization (OKSA). In OKSA, the supplier is able to verify the to-be-search keyword belonging to the authorized keyword set for a user before running the OKS protocol. The proposed OKSA augments the traditional OKS by providing assurance of keyword authorization besides oblivious search. Then we present an OKSA protocol and formally prove its security. The proposed protocol features with one-round (two-pass) interaction and constant size communication cost between the supplier and the user in the transfer phase. Precisely, the communication cost nseeds only four group elements (three group elements for keyword token and proof, and one group element for assigned trapdoor), independent of the size of authorized keyword set.

Original languageEnglish
Title of host publicationProvable Security - 10th International Conference, ProvSec 2016, Proceedings
EditorsLiqun Chen, Jinguang Han
PublisherSpringer Verlag
Pages173-190
Number of pages18
ISBN (Print)9783319474212
DOIs
Publication statusPublished - 2016
Externally publishedYes
Event10th International Conference on Provable Security, ProvSec 2016 - Nanjing, China
Duration: 10 Nov 201611 Nov 2016

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume10005 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference10th International Conference on Provable Security, ProvSec 2016
Country/TerritoryChina
CityNanjing
Period10/11/1611/11/16

Keywords

  • Authorization
  • Keyword search
  • Oblivious transfer

Fingerprint

Dive into the research topics of 'Oblivious keyword search with authorization'. Together they form a unique fingerprint.

Cite this