2004
DOI: 10.1007/978-3-540-24676-3_30
|View full text |Cite
|
Sign up to set email alerts
|

Public Key Encryption with Keyword Search

Abstract: Abstract.We study the problem of searching on data that is encrypted using a public key system. Consider user Bob who sends email to user Alice encrypted under Alice's public key. An email gateway wants to test whether the email contains the keyword "urgent" so that it could route the email accordingly. Alice, on the other hand does not wish to give the gateway the ability to decrypt all her messages. We define and construct a mechanism that enables Alice to provide a key to the gateway that enables the gatewa… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

2
1,779
0
14

Year Published

2013
2013
2021
2021

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 2,152 publications
(1,897 citation statements)
references
References 27 publications
(40 reference statements)
2
1,779
0
14
Order By: Relevance
“…Secure computations on binary decision trees were introduced in [8], yet they have long execution time due to the use of the IBM HElib library. Searching an encrypted database was previeously addressed by [4], [6], [7], [14]. One drawback in [4], [6] was the need for a special key to aid the server in performing the search request.…”
Section: Related Workmentioning
confidence: 99%
See 3 more Smart Citations
“…Secure computations on binary decision trees were introduced in [8], yet they have long execution time due to the use of the IBM HElib library. Searching an encrypted database was previeously addressed by [4], [6], [7], [14]. One drawback in [4], [6] was the need for a special key to aid the server in performing the search request.…”
Section: Related Workmentioning
confidence: 99%
“…Searching an encrypted database was previeously addressed by [4], [6], [7], [14]. One drawback in [4], [6] was the need for a special key to aid the server in performing the search request. They achieve a weaker security notion, namely one where partial information about the data access pattern is leaked.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…Identity-based encryption (IBE) [21,8,13,4,5,23] can be viewed as predicate encryption for the class of equality tests; the standard notion of security for IBE [8,12] corresponds to payload-hiding, while anonymous IBE [7,11,14] corresponds to the stronger notion of attribute hiding. Attribute-based encryption schemes [20,15,3,19] can also be cast in the framework of predicate encryption, though in this case all the listed constructions achieve payload hiding only.…”
Section: Introductionmentioning
confidence: 99%