Paper Abstract and Keywords |
Presentation |
2015-03-04 14:05
A Transformation from Attribute-based Encryption to Associative Searchable Encryption by Using Hash Function Koji Tomida (Nagoya Inst. of Tech.), Hiroshi Doi (IISEC), Masami Mohri (Gifu Univ.), Yoshiaki Shiraishi (Kobe Univ.) ICSS2014-92 |
Abstract |
(in Japanese) |
(See Japanese page) |
(in English) |
Combining the concept of PEKS and IBE, the Identity-Based Encryption with Keyword Search (IBEKS) has been proposed. In IBEKS scheme, trapdoors which can search a ciphertext are specified by the identity of the ciphertext like IBE. If a trapdoor satisfies the search condition specified in a ciphertext and the keyword associated with the trapdoor is equal to that of the ciphertext, then the trapdoor can search the ciphertext. In IBEKS scheme, if you want to search n different keywords with the same condition, you should make n trapdoors and query to the server n times. To reduce the computational cost of generating trapdoors of searcher and the communication cost between the server and the searcher, we propose associative keyword searchable encryption (AKSE). In AKSE, once the server receives a trapdoor from a searcher as search query, the server can generate new trapdoors with the same search condition associated with the trapdoor for different keywords and conduct search on the ciphertexts. Thus, the computational cost of generating trapdoors of searcher and the communication cost between the server and the searcher can be reduced. In this paper, we concentrate on constructing AKSE scheme. We consider that the computational cost should be low for practical use and intend to construct AKSE scheme from a cryptographic scheme which has low computational cost in a simple way. For constructing AKSE, we use key-policy attribute-based encryption (KP-ABE) scheme. We show a transformation from KP-ABE scheme into AKSE scheme and prove the security of AKSE schemes transformed from KP-ABE schemes. |
Keyword |
(in Japanese) |
(See Japanese page) |
(in English) |
Searchable encryption / Key-policy attribute-based encryption / Semantic security / / / / / |
Reference Info. |
IEICE Tech. Rep., vol. 114, no. 489, ICSS2014-92, pp. 175-179, March 2015. |
Paper # |
ICSS2014-92 |
Date of Issue |
2015-02-24 (ICSS) |
ISSN |
Print edition: ISSN 0913-5685 Online edition: ISSN 2432-6380 |
Copyright and reproduction |
All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034) |
Download PDF |
ICSS2014-92 |
Conference Information |
Committee |
ICSS |
Conference Date |
2015-03-03 - 2015-03-04 |
Place (in Japanese) |
(See Japanese page) |
Place (in English) |
Meio Univiersity |
Topics (in Japanese) |
(See Japanese page) |
Topics (in English) |
Communication Security, etc. |
Paper Information |
Registration To |
ICSS |
Conference Code |
2015-03-ICSS |
Language |
English |
Title (in Japanese) |
(See Japanese page) |
Sub Title (in Japanese) |
(See Japanese page) |
Title (in English) |
A Transformation from Attribute-based Encryption to Associative Searchable Encryption by Using Hash Function |
Sub Title (in English) |
|
Keyword(1) |
Searchable encryption |
Keyword(2) |
Key-policy attribute-based encryption |
Keyword(3) |
Semantic security |
Keyword(4) |
|
Keyword(5) |
|
Keyword(6) |
|
Keyword(7) |
|
Keyword(8) |
|
1st Author's Name |
Koji Tomida |
1st Author's Affiliation |
Nagoya Institute of Technology (Nagoya Inst. of Tech.) |
2nd Author's Name |
Hiroshi Doi |
2nd Author's Affiliation |
Institute of Information Security (IISEC) |
3rd Author's Name |
Masami Mohri |
3rd Author's Affiliation |
Gifu University (Gifu Univ.) |
4th Author's Name |
Yoshiaki Shiraishi |
4th Author's Affiliation |
Kobe University (Kobe Univ.) |
5th Author's Name |
|
5th Author's Affiliation |
() |
6th Author's Name |
|
6th Author's Affiliation |
() |
7th Author's Name |
|
7th Author's Affiliation |
() |
8th Author's Name |
|
8th Author's Affiliation |
() |
9th Author's Name |
|
9th Author's Affiliation |
() |
10th Author's Name |
|
10th Author's Affiliation |
() |
11th Author's Name |
|
11th Author's Affiliation |
() |
12th Author's Name |
|
12th Author's Affiliation |
() |
13th Author's Name |
|
13th Author's Affiliation |
() |
14th Author's Name |
|
14th Author's Affiliation |
() |
15th Author's Name |
|
15th Author's Affiliation |
() |
16th Author's Name |
|
16th Author's Affiliation |
() |
17th Author's Name |
|
17th Author's Affiliation |
() |
18th Author's Name |
|
18th Author's Affiliation |
() |
19th Author's Name |
|
19th Author's Affiliation |
() |
20th Author's Name |
|
20th Author's Affiliation |
() |
Speaker |
Author-1 |
Date Time |
2015-03-04 14:05:00 |
Presentation Time |
25 minutes |
Registration for |
ICSS |
Paper # |
ICSS2014-92 |
Volume (vol) |
vol.114 |
Number (no) |
no.489 |
Page |
pp.175-179 |
#Pages |
5 |
Date of Issue |
2015-02-24 (ICSS) |
|