Skip to main content

A Novel Construction for PEKS Scheme Using Matrix Group

  • Conference paper
Ubiquitous Information Technologies and Applications

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 280))

  • 1410 Accesses

Abstract

Public key Encryption with Keyword Search (PEKS) scheme enables a sender to send encrypted data to a third party using the receiver’s public key. The receiver who owns the private key is able to give the third party the ability of search for some relevant data items by keywords without revealing the content of data and keywords. In this paper, we study the problem of PEKS construction without using bilinear maps. Our construction is based on the action of a matrix group on a set of vectors. The security of our system relies on the difficulty of discrete logarithm problem in the matrix group. Experimental results we obtained indicated that our construction over GF(2)is very efficient in terms of the time complexity.

This work was supported by the project "Design and implementation of FPGA-cryptography IP cores" (No. B2012-18-02TĐ).

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 259.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 329.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 329.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Boneh, D., Di Crescenzo, G., Ostrovsky, R., Persiano, G.: Public-key encryption with keyword search. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 506–522. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  2. Golle, P., Staddon, J., Waters, B.: Secure conjunctive keyword search over encrypted data. In: Jakobsson, M., Yung, M., Zhou, J. (eds.) ACNS 2004. LNCS, vol. 3089, pp. 31–45. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  3. Abdalla, M., Bellare, M., Catalano, D., Kiltz, E., Kohno, T., Lange, T., Malone-Lee, J., Neven, G., Paillier, P., Shi, H.: Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 205–222. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  4. Baek, J., Safavi-Naini, R., Susilo, W.: On the integration of public key data encryption and public key encryption with keyword search. In: Katsikas, S.K., López, J., Backes, M., Gritzalis, S., Preneel, B. (eds.) ISC 2006. LNCS, vol. 4176, pp. 217–232. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  5. Hwang, Y.-H., Lee, P.J.: Public key encryption with conjunctive keyword search and its extension to a multi-user system. In: Takagi, T., Okamoto, T., Okamoto, E., Okamoto, T. (eds.) Pairing 2007. LNCS, vol. 4575, pp. 2–22. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  6. Boneh, D., Waters, B.: Conjunctive, Subset, and Range Queries on Encrypted Data. In: Vadhan, S.P. (ed.) TCC 2007. LNCS, vol. 4392, pp. 535–554. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  7. Baek, J., Safavi-Naini, R., Susilo, W.: Public key encryption with key-word search revisited. In: Gervasi, O., Murgante, B., Laganà, A., Taniar, D., Mun, Y., Gavrilova, M.L. (eds.) ICCSA 2008, Part I. LNCS, vol. 5072, pp. 1249–1259. Springer, Heidelberg (2008)

    Chapter  Google Scholar 

  8. Tang, Q., Chen, L.: Public-Key Encryption with Registered Keyword Search. In: Martinelli, F., Preneel, B. (eds.) EuroPKI 2009. LNCS, vol. 6391, pp. 163–178. Springer, Heidelberg (2010)

    Chapter  Google Scholar 

  9. Di Crescenzo, G., Saraswat, V.: Public key encryption with searchable keywords based on Jacobi symbols. In: Srinathan, K., Rangan, C.P., Yung, M. (eds.) INDOCRYPT 2007. LNCS, vol. 4859, pp. 282–296. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  10. Khader, D.: Public Key Encryption with Keyword Search based on K-Resilient IBE. In: Gavrilova, M.L., Gervasi, O., Kumar, V., Tan, C.J.K., Taniar, D., Laganá, A., Mun, Y., Choo, H. (eds.) ICCSA 2006. LNCS, vol. 3982, pp. 298–308. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  11. Ibraimi, L., Nikova, S., Hartel, P., Jonker, W.: Public-Key encryption with Delegated Search. In: Lopez, J., Tsudik, G. (eds.) ACNS 2011. LNCS, vol. 6715, pp. 532–549. Springer, Heidelberg (2011)

    Chapter  Google Scholar 

  12. Menezes, A., Wu, Y.-H.: The discrete logarithm problem in GL(n, q). Ars Combinatorica 47, 23–32 (1997)

    MathSciNet  MATH  Google Scholar 

  13. Tang, Q.: Revisit the Concept of PEKS: Problems and a Possible Solution. Technical Report TR-CTIT-08-54 (2008) ISSN 1381–3625

    Google Scholar 

  14. Byun, J.W., Rhee, H.S., Park, H.-A., Lee, D.-H.: Offline keyword guessing attack on recent keyword search schemes. In: Jonker, W., Petković, M. (eds.) SDM 2006. LNCS, vol. 4165, pp. 75–83. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  15. Heng, S.-H., Kurosawa, K.: k-Resilient Identity-Based Encryption in the Standard Model. In: Okamoto, T. (ed.) CT-RSA 2004. LNCS, vol. 2964, pp. 67–80. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  16. Cormen, T.H., Leiserson, C.E., Rivest, R.L., Stein, C.: 34.5.5: The subset-sum problem. In: Introduction to Algorithms, 3rd edn. MIT Press and McGraw-Hill (2009) ISBN 0–262–03293–7

    Google Scholar 

  17. Nguyen, T.D., Van Dang, H.: Quasi-inverse Based Cryptography. In: Murgante, B., Misra, S., Carlini, M., Torre, C.M., Nguyen, H.-Q., Taniar, D., Apduhan, B.O., Gervasi, O. (eds.) ICCSA 2013, Part IV. LNCS, vol. 7974, pp. 629–642. Springer, Heidelberg (2013)

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Tin Q. Phan .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Phan, T.Q., Dang, V.H., Nguyen, T.D. (2014). A Novel Construction for PEKS Scheme Using Matrix Group. In: Jeong, YS., Park, YH., Hsu, CH., Park, J. (eds) Ubiquitous Information Technologies and Applications. Lecture Notes in Electrical Engineering, vol 280. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-41671-2_43

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-41671-2_43

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-41670-5

  • Online ISBN: 978-3-642-41671-2

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics