IEICE Technical Committee Submission System
Conference Paper's Information
Online Proceedings
[Sign in]
Tech. Rep. Archives
 Go Top Page Go Previous   [Japanese] / [English] 

Paper Abstract and Keywords
Presentation 2015-03-04 14:05
A Transformation from Attribute-based Encryption to Associative Searchable Encryption by Using Hash Function
Koji Tomida (Nagoya Inst. of Tech.), Hiroshi Doi (IISEC), Masami Mohri (Gifu Univ.), Yoshiaki Shiraishi (Kobe Univ.) ICSS2014-92
Abstract (in Japanese) (See Japanese page) 
(in English) Combining the concept of PEKS and IBE, the Identity-Based Encryption with Keyword Search (IBEKS) has been proposed. In IBEKS scheme, trapdoors which can search a ciphertext are specified by the identity of the ciphertext like IBE. If a trapdoor satisfies the search condition specified in a ciphertext and the keyword associated with the trapdoor is equal to that of the ciphertext, then the trapdoor can search the ciphertext. In IBEKS scheme, if you want to search n different keywords with the same condition, you should make n trapdoors and query to the server n times. To reduce the computational cost of generating trapdoors of searcher and the communication cost between the server and the searcher, we propose associative keyword searchable encryption (AKSE). In AKSE, once the server receives a trapdoor from a searcher as search query, the server can generate new trapdoors with the same search condition associated with the trapdoor for different keywords and conduct search on the ciphertexts. Thus, the computational cost of generating trapdoors of searcher and the communication cost between the server and the searcher can be reduced. In this paper, we concentrate on constructing AKSE scheme. We consider that the computational cost should be low for practical use and intend to construct AKSE scheme from a cryptographic scheme which has low computational cost in a simple way. For constructing AKSE, we use key-policy attribute-based encryption (KP-ABE) scheme. We show a transformation from KP-ABE scheme into AKSE scheme and prove the security of AKSE schemes transformed from KP-ABE schemes.
Keyword (in Japanese) (See Japanese page) 
(in English) Searchable encryption / Key-policy attribute-based encryption / Semantic security / / / / /  
Reference Info. IEICE Tech. Rep., vol. 114, no. 489, ICSS2014-92, pp. 175-179, March 2015.
Paper # ICSS2014-92 
Date of Issue 2015-02-24 (ICSS) 
ISSN Print edition: ISSN 0913-5685    Online edition: ISSN 2432-6380
Copyright
and
reproduction
All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)
Download PDF ICSS2014-92

Conference Information
Committee ICSS  
Conference Date 2015-03-03 - 2015-03-04 
Place (in Japanese) (See Japanese page) 
Place (in English) Meio Univiersity 
Topics (in Japanese) (See Japanese page) 
Topics (in English) Communication Security, etc. 
Paper Information
Registration To ICSS 
Conference Code 2015-03-ICSS 
Language English 
Title (in Japanese) (See Japanese page) 
Sub Title (in Japanese) (See Japanese page) 
Title (in English) A Transformation from Attribute-based Encryption to Associative Searchable Encryption by Using Hash Function 
Sub Title (in English)  
Keyword(1) Searchable encryption  
Keyword(2) Key-policy attribute-based encryption  
Keyword(3) Semantic security  
Keyword(4)  
Keyword(5)  
Keyword(6)  
Keyword(7)  
Keyword(8)  
1st Author's Name Koji Tomida  
1st Author's Affiliation Nagoya Institute of Technology (Nagoya Inst. of Tech.)
2nd Author's Name Hiroshi Doi  
2nd Author's Affiliation Institute of Information Security (IISEC)
3rd Author's Name Masami Mohri  
3rd Author's Affiliation Gifu University (Gifu Univ.)
4th Author's Name Yoshiaki Shiraishi  
4th Author's Affiliation Kobe University (Kobe Univ.)
5th Author's Name  
5th Author's Affiliation ()
6th Author's Name  
6th Author's Affiliation ()
7th Author's Name  
7th Author's Affiliation ()
8th Author's Name  
8th Author's Affiliation ()
9th Author's Name  
9th Author's Affiliation ()
10th Author's Name  
10th Author's Affiliation ()
11th Author's Name  
11th Author's Affiliation ()
12th Author's Name  
12th Author's Affiliation ()
13th Author's Name  
13th Author's Affiliation ()
14th Author's Name  
14th Author's Affiliation ()
15th Author's Name  
15th Author's Affiliation ()
16th Author's Name  
16th Author's Affiliation ()
17th Author's Name  
17th Author's Affiliation ()
18th Author's Name  
18th Author's Affiliation ()
19th Author's Name  
19th Author's Affiliation ()
20th Author's Name  
20th Author's Affiliation ()
Speaker Author-1 
Date Time 2015-03-04 14:05:00 
Presentation Time 25 minutes 
Registration for ICSS 
Paper # ICSS2014-92 
Volume (vol) vol.114 
Number (no) no.489 
Page pp.175-179 
#Pages
Date of Issue 2015-02-24 (ICSS) 


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan