@inproceedings{ceaeadc9069b46439dfdd3d7112bcc17,
title = "Oblivious keyword search with authorization",
abstract = "Oblivious keyword search (OKS) allows a user to search and retrieve the data associated with a chosen keyword in an oblivious way. The database supplier issues a trapdoor (used for searching) of a specific keyword chosen by the user while learns nothing about this keyword. In this paper, we propose a new cryptographic primitive called oblivious keyword search with authorization (OKSA). In OKSA, the supplier is able to verify the to-be-search keyword belonging to the authorized keyword set for a user before running the OKS protocol. The proposed OKSA augments the traditional OKS by providing assurance of keyword authorization besides oblivious search. Then we present an OKSA protocol and formally prove its security. The proposed protocol features with one-round (two-pass) interaction and constant size communication cost between the supplier and the user in the transfer phase. Precisely, the communication cost nseeds only four group elements (three group elements for keyword token and proof, and one group element for assigned trapdoor), independent of the size of authorized keyword set.",
keywords = "Authorization, Keyword search, Oblivious transfer",
author = "Peng Jiang and Xiaofen Wang and Jianchang Lai and Fuchun Guo and Rongmao Chen",
note = "Publisher Copyright: {\textcopyright} Springer International Publishing AG 2016.; 10th International Conference on Provable Security, ProvSec 2016 ; Conference date: 10-11-2016 Through 11-11-2016",
year = "2016",
doi = "10.1007/978-3-319-47422-9_10",
language = "English",
isbn = "9783319474212",
series = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",
publisher = "Springer Verlag",
pages = "173--190",
editor = "Liqun Chen and Jinguang Han",
booktitle = "Provable Security - 10th International Conference, ProvSec 2016, Proceedings",
address = "Germany",
}