The platform will undergo maintenance on Sep 14 at about 7:45 AM EST and will be unavailable for approximately 2 hours.
2009
DOI: 10.1007/978-3-642-00468-1_12
|View full text |Cite
|
Sign up to set email alerts
|

Blind and Anonymous Identity-Based Encryption and Authorised Private Searches on Public Key Encrypted Data

Abstract: Abstract. Searchable encryption schemes provide an important mechanism to cryptographically protect data while keeping it available to be searched and accessed. In a common approach for their construction, the encrypting entity chooses one or several keywords that describe the content of each encrypted record of data. To perform a search, a user obtains a trapdoor for a keyword of her interest and uses this trapdoor to find all the data described by this keyword.We present a searchable encryption scheme that a… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
76
0

Year Published

2012
2012
2022
2022

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 97 publications
(76 citation statements)
references
References 43 publications
0
76
0
Order By: Relevance
“…Firstly, we require an anonymous scheme which is secure in the standard model and sufficiently efficient, this requirement excludes many distributed schemes like Sakai-Kasahara in [20,4,6], Boneh-Franklin in [6]. Secondly, we require a scheme for which there exists a distributed version that is relatively efficient and practical, since Gentry's scheme shares similarities with Sakai-Kasahara, it can be distributed the same way as in [4,6], this requirement excludes also the scheme of Boyen-Waters [15] modified in [10] due to its complex structure of user's private-keys which makes the distribution of these schemes much more difficult. Let COM = (Setup, Commit) be a secure commitment scheme and let Π (KeyGen, Enc, Dec) be an additively homomorphic and semantically secure encryption scheme, such that Enc(e) ⊗ r = Enc(er), and Enc(a) ⊕ Enc(b) = Enc(a + b).…”
Section: Constructionmentioning
confidence: 99%
See 3 more Smart Citations
“…Firstly, we require an anonymous scheme which is secure in the standard model and sufficiently efficient, this requirement excludes many distributed schemes like Sakai-Kasahara in [20,4,6], Boneh-Franklin in [6]. Secondly, we require a scheme for which there exists a distributed version that is relatively efficient and practical, since Gentry's scheme shares similarities with Sakai-Kasahara, it can be distributed the same way as in [4,6], this requirement excludes also the scheme of Boyen-Waters [15] modified in [10] due to its complex structure of user's private-keys which makes the distribution of these schemes much more difficult. Let COM = (Setup, Commit) be a secure commitment scheme and let Π (KeyGen, Enc, Dec) be an additively homomorphic and semantically secure encryption scheme, such that Enc(e) ⊗ r = Enc(er), and Enc(a) ⊕ Enc(b) = Enc(a + b).…”
Section: Constructionmentioning
confidence: 99%
“…We follow a generic transformation in [1,10,16] to transform our blind anonymous (n, t)-IBE into TPEKS with oblivious keyword search. Notice that Gentry's scheme uses stateful randomness in the secret key generation phase.…”
Section: Threshold Peks With Oblivious Abstractearchmentioning
confidence: 99%
See 2 more Smart Citations
“…When an IBE scheme is anonymous, the scheme can hide both, the message and the identity, embedded in the ciphertext. Improved AIBE schemes have been proposed in [13,24,5,15]. The schemes cited above are useful for the equality search only, i.e.…”
Section: Related Workmentioning
confidence: 99%