Searchable encryption revisited: Consistency properties, relation to anonymous IBE, and extensions

272Citations
Citations of this article
166Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

We identify and fill some gaps with regard to consistency (the extent to which false positives are produced) for public-key encryption with keyword search (PEKS). We define computational and statistical relaxations of the existing notion of perfect consistency, show that the scheme of Boneh et al. (Advances in Cryptology-EUROCRYPT 2004, ed. by C. Cachin, J. Camenisch, pp. 506-522, 2004) is computationally consistent, and provide a new scheme that is statistically consistent. We also provide a transform of an anonymous identity-based encryption (IBE) scheme to a secure PEKS scheme that, unlike the previous one, guarantees consistency. Finally, we suggest three extensions of the basic notions considered here, namely anonymous hierarchical identity-based encryption, public-key encryption with temporary keyword search, and identity-based encryption with keyword search. © 2007 International Association for Cryptologic Research.

Cite

CITATION STYLE

APA

Abdalla, M., Bellare, M., Catalano, D., Kiltz, E., Kohno, T., Lange, T., … Shi, H. (2008). Searchable encryption revisited: Consistency properties, relation to anonymous IBE, and extensions. Journal of Cryptology, 21(3), 350–391. https://doi.org/10.1007/s00145-007-9006-6

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free