ePrints@IIScePrints@IISc Home | About | Browse | Latest Additions | Advanced Search | Contact | Help

Keyword search meets membership testing: Adaptive security from SXDH

Chatterjee, S and Mukherjee, S (2018) Keyword search meets membership testing: Adaptive security from SXDH. In: 19th International Conference on Cryptology in India, INDOCRYPT 2018, 9 - 12 December 2018, New Delhi, pp. 21-43.

Full text not available from this repository.
Official URL: https://doi.org/10.1007/978-3-030-05378-9_2


Searchable encryption (SE) allows users to securely store sensitive data in encrypted form on cloud and at the same time perform keyword search over the encrypted documents. In this work, we focus on variants of SE schemes that along with keyword search, also support membership testing. The problem can be formulated in two flavors depending on whether the search policy is encoded in the ciphertext or in the trapdoor. The ciphertext-policy variant is called Broadcast Encryption with Keyword Search (BEKS) and allows only privileged users to perform keyword search on an encrypted file. Available dedicated constructions could achieve selective security under parameterized assumption. The key-policy variant, called Key-Aggregate Searchable Encryption (KASE), restricts the keyword search within a particular set of documents. Naive application of existing SE schemes in this scenario leads to inefficient protocols with either variable length trapdoor or exponential blowup of storage requirement in terms of the document set size. This therefore calls for an efficient solution that allows such subset based restricted search with constant trapdoor size. In this work, we have presented adaptively secure solutions for both the above problems. Our BEKS construction achieves constant-size ciphertext whereas the KASE construction achieves constant-size trapdoor. Both the constructions are instantiated in prime-order bilinear groups and are proven anonymous CPA-secure under SXDH assumption by extending Jutla-Roy technique. Our proposed solutions improve upon the only other adaptively secure schemes that can be obtained using the generic technique of Ambrona et al.

Item Type: Conference Paper
Publication: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Publisher: Springer Verlag
Additional Information: The copyright for this article belongs to the Springer Verlag.
Keywords: Digital storage; Search engines; Security of data, Adaptive security; Bilinear groups; Broadcast encryption; Ciphertext policies; Constant size ciphertext; Searchable encryptions; Storage requirements; Variable length, Cryptography
Department/Centre: Division of Electrical Sciences > Computer Science & Automation
Date Deposited: 19 Aug 2022 05:11
Last Modified: 19 Aug 2022 05:11
URI: https://eprints.iisc.ac.in/id/eprint/75976

Actions (login required)

View Item View Item