@inproceedings{5767fe7dafc446a796c315b79ffaf403,
title = "Public key encryption with authorized keyword search",
abstract = "Public key encryption with keyword search (PEKS) provides an elegant mechanism for a user to identify the specific encrypted data. PEKS protects data against disclosure while making it searchable. In this paper, we propose a new cryptographic primitive called public key encryption with authorized keyword search (PEAKS). In PEAKS, keywords are encrypted with one public key and users without corresponding secret key need authorization from the authority to search keywords. We present a concrete PEAKS construction which allows the authority to authorize users to search different keyword sets. The proposed scheme features with the constant-size authorized token, independent of the size of keyword set size, which cuts down bandwidth consumption considerably. This property makes our PEAKS quite useful when the authorized token needs to be frequently updated with time for security purpose. The semantical security against chosen keyword attack and trapdoor unforgeability are formally proved.",
keywords = "Encrypted keyword search, Low bandwidth, Public key encryption",
author = "Peng Jiang and Yi Mu and Fuchun Guo and Qiaoyan Wen",
note = "Publisher Copyright: {\textcopyright} Springer International Publishing Switzerland 2016.; 21st Australasian Conference on Information Security and Privacy, ACISP 2016 ; Conference date: 04-07-2016 Through 06-07-2016",
year = "2016",
doi = "10.1007/978-3-319-40367-0_11",
language = "English",
isbn = "9783319403663",
series = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",
publisher = "Springer Verlag",
pages = "170--186",
editor = "Liu, {Joseph K.} and Ron Steinfeld",
booktitle = "Information Security and Privacy - 21st Australasian Conference, ACISP 2016, Proceedings",
address = "Germany",
}