Public Key Encryption with Keyword Search
We study the problem of searching on data that is encrypted using a public key system. Consider user Bob who sends email to user Alice encrypted under Alice’s public key. An email gateway wants to test whether the email contains the keyword “urgent” so that it could route the email accordingly. Alic...
Gespeichert in:
Hauptverfasser: | , , , |
---|---|
Format: | Buchkapitel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 522 |
---|---|
container_issue | |
container_start_page | 506 |
container_title | |
container_volume | 3027 |
creator | Boneh, Dan Di Crescenzo, Giovanni Ostrovsky, Rafail Persiano, Giuseppe |
description | We study the problem of searching on data that is encrypted using a public key system. Consider user Bob who sends email to user Alice encrypted under Alice’s public key. An email gateway wants to test whether the email contains the keyword “urgent” so that it could route the email accordingly. Alice, on the other hand does not wish to give the gateway the ability to decrypt all her messages. We define and construct a mechanism that enables Alice to provide a key to the gateway that enables the gateway to test whether the word “urgent” is a keyword in the email without learning anything else about the email. We refer to this mechanism as Public Key Encryption with keyword Search. As another example, consider a mail server that stores various messages publicly encrypted for Alice by others. Using our mechanism Alice can send the mail server a key that will enable the server to identify all messages containing some specific keyword, but learn nothing else. We define the concept of public key encryption with keyword search and give several constructions. |
doi_str_mv | 10.1007/978-3-540-24676-3_30 |
format | Book Chapter |
fullrecord | <record><control><sourceid>proquest_pasca</sourceid><recordid>TN_cdi_pascalfrancis_primary_15811270</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>EBC3088562_36_518</sourcerecordid><originalsourceid>FETCH-LOGICAL-p318t-5f98667f1caad85b8492de6472f0000fb5995db0650cef3021081fea0db0f283</originalsourceid><addsrcrecordid>eNotkMtOwzAQRc1ThNI_YNENCxYGjx079hJV5SEqgUT3luPYNBCSYKeq-vc4Ld6MdOfMjHUQugZyB4QU96qQmGGeE0xzUQjMNCNH6JKlZB_QY5SBAMCM5eoETRO_74FK5RRlhBGKVZGzc5SphEiiKL9A0xi_yPiUZJJm6PZ9Uza1nb263WzR2rDrh7prZ9t6WI_ZtgvV7MOZYNdX6MybJrrpf52g1eNiNX_Gy7enl_nDEvcM5IC5V1KIwoM1ppK8lLmilRN5Qf141pdcKV6VRHBinU-fBCLBO0NS5qlkE3RzWNubaE3jg2ltHXUf6h8Tdhq4BKAFSRw9cDG12k8XdNl131ED0aM_nXxoppMRvdelR39piP0vD93vxsVBu3HKunYIprFr0w8uxERKyQXVTGgOkv0BXO1sBA</addsrcrecordid><sourcetype>Index Database</sourcetype><iscdi>true</iscdi><recordtype>book_chapter</recordtype><pqid>EBC3088562_36_518</pqid></control><display><type>book_chapter</type><title>Public Key Encryption with Keyword Search</title><source>Springer Books</source><creator>Boneh, Dan ; Di Crescenzo, Giovanni ; Ostrovsky, Rafail ; Persiano, Giuseppe</creator><contributor>Cachin, Christian ; Camenisch, Jan</contributor><creatorcontrib>Boneh, Dan ; Di Crescenzo, Giovanni ; Ostrovsky, Rafail ; Persiano, Giuseppe ; Cachin, Christian ; Camenisch, Jan</creatorcontrib><description>We study the problem of searching on data that is encrypted using a public key system. Consider user Bob who sends email to user Alice encrypted under Alice’s public key. An email gateway wants to test whether the email contains the keyword “urgent” so that it could route the email accordingly. Alice, on the other hand does not wish to give the gateway the ability to decrypt all her messages. We define and construct a mechanism that enables Alice to provide a key to the gateway that enables the gateway to test whether the word “urgent” is a keyword in the email without learning anything else about the email. We refer to this mechanism as Public Key Encryption with keyword Search. As another example, consider a mail server that stores various messages publicly encrypted for Alice by others. Using our mechanism Alice can send the mail server a key that will enable the server to identify all messages containing some specific keyword, but learn nothing else. We define the concept of public key encryption with keyword search and give several constructions.</description><identifier>ISSN: 0302-9743</identifier><identifier>ISBN: 9783540219354</identifier><identifier>ISBN: 3540219358</identifier><identifier>EISSN: 1611-3349</identifier><identifier>EISBN: 3540246762</identifier><identifier>EISBN: 9783540246763</identifier><identifier>DOI: 10.1007/978-3-540-24676-3_30</identifier><identifier>OCLC: 934980925</identifier><identifier>LCCallNum: QA268</identifier><language>eng</language><publisher>Germany: Springer Berlin / Heidelberg</publisher><subject>Applied sciences ; Computer science; control theory; systems ; Computer systems and distributed systems. User interface ; Cryptography ; Encryption Scheme ; Exact sciences and technology ; Information, signal and communications theory ; Oblivious Transfer ; Random Oracle ; Random Oracle Model ; Security Parameter ; Signal and communications theory ; Software ; Telecommunications and information theory</subject><ispartof>Advances in Cryptology - EUROCRYPT 2004, 2004, Vol.3027, p.506-522</ispartof><rights>Springer-Verlag Berlin Heidelberg 2004</rights><rights>2004 INIST-CNRS</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><relation>Lecture Notes in Computer Science</relation></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Uhttps://ebookcentral.proquest.com/covers/3088562-l.jpg</thumbnail><linktopdf>$$Uhttps://link.springer.com/content/pdf/10.1007/978-3-540-24676-3_30$$EPDF$$P50$$Gspringer$$H</linktopdf><linktohtml>$$Uhttps://link.springer.com/10.1007/978-3-540-24676-3_30$$EHTML$$P50$$Gspringer$$H</linktohtml><link.rule.ids>309,310,775,776,780,785,786,789,4036,4037,27902,38232,41418,42487</link.rule.ids><backlink>$$Uhttp://pascal-francis.inist.fr/vibad/index.php?action=getRecordDetail&idt=15811270$$DView record in Pascal Francis$$Hfree_for_read</backlink></links><search><contributor>Cachin, Christian</contributor><contributor>Camenisch, Jan</contributor><creatorcontrib>Boneh, Dan</creatorcontrib><creatorcontrib>Di Crescenzo, Giovanni</creatorcontrib><creatorcontrib>Ostrovsky, Rafail</creatorcontrib><creatorcontrib>Persiano, Giuseppe</creatorcontrib><title>Public Key Encryption with Keyword Search</title><title>Advances in Cryptology - EUROCRYPT 2004</title><description>We study the problem of searching on data that is encrypted using a public key system. Consider user Bob who sends email to user Alice encrypted under Alice’s public key. An email gateway wants to test whether the email contains the keyword “urgent” so that it could route the email accordingly. Alice, on the other hand does not wish to give the gateway the ability to decrypt all her messages. We define and construct a mechanism that enables Alice to provide a key to the gateway that enables the gateway to test whether the word “urgent” is a keyword in the email without learning anything else about the email. We refer to this mechanism as Public Key Encryption with keyword Search. As another example, consider a mail server that stores various messages publicly encrypted for Alice by others. Using our mechanism Alice can send the mail server a key that will enable the server to identify all messages containing some specific keyword, but learn nothing else. We define the concept of public key encryption with keyword search and give several constructions.</description><subject>Applied sciences</subject><subject>Computer science; control theory; systems</subject><subject>Computer systems and distributed systems. User interface</subject><subject>Cryptography</subject><subject>Encryption Scheme</subject><subject>Exact sciences and technology</subject><subject>Information, signal and communications theory</subject><subject>Oblivious Transfer</subject><subject>Random Oracle</subject><subject>Random Oracle Model</subject><subject>Security Parameter</subject><subject>Signal and communications theory</subject><subject>Software</subject><subject>Telecommunications and information theory</subject><issn>0302-9743</issn><issn>1611-3349</issn><isbn>9783540219354</isbn><isbn>3540219358</isbn><isbn>3540246762</isbn><isbn>9783540246763</isbn><fulltext>true</fulltext><rsrctype>book_chapter</rsrctype><creationdate>2004</creationdate><recordtype>book_chapter</recordtype><recordid>eNotkMtOwzAQRc1ThNI_YNENCxYGjx079hJV5SEqgUT3luPYNBCSYKeq-vc4Ld6MdOfMjHUQugZyB4QU96qQmGGeE0xzUQjMNCNH6JKlZB_QY5SBAMCM5eoETRO_74FK5RRlhBGKVZGzc5SphEiiKL9A0xi_yPiUZJJm6PZ9Uza1nb263WzR2rDrh7prZ9t6WI_ZtgvV7MOZYNdX6MybJrrpf52g1eNiNX_Gy7enl_nDEvcM5IC5V1KIwoM1ppK8lLmilRN5Qf141pdcKV6VRHBinU-fBCLBO0NS5qlkE3RzWNubaE3jg2ltHXUf6h8Tdhq4BKAFSRw9cDG12k8XdNl131ED0aM_nXxoppMRvdelR39piP0vD93vxsVBu3HKunYIprFr0w8uxERKyQXVTGgOkv0BXO1sBA</recordid><startdate>2004</startdate><enddate>2004</enddate><creator>Boneh, Dan</creator><creator>Di Crescenzo, Giovanni</creator><creator>Ostrovsky, Rafail</creator><creator>Persiano, Giuseppe</creator><general>Springer Berlin / Heidelberg</general><general>Springer Berlin Heidelberg</general><general>Springer</general><scope>FFUUA</scope><scope>IQODW</scope></search><sort><creationdate>2004</creationdate><title>Public Key Encryption with Keyword Search</title><author>Boneh, Dan ; Di Crescenzo, Giovanni ; Ostrovsky, Rafail ; Persiano, Giuseppe</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-p318t-5f98667f1caad85b8492de6472f0000fb5995db0650cef3021081fea0db0f283</frbrgroupid><rsrctype>book_chapters</rsrctype><prefilter>book_chapters</prefilter><language>eng</language><creationdate>2004</creationdate><topic>Applied sciences</topic><topic>Computer science; control theory; systems</topic><topic>Computer systems and distributed systems. User interface</topic><topic>Cryptography</topic><topic>Encryption Scheme</topic><topic>Exact sciences and technology</topic><topic>Information, signal and communications theory</topic><topic>Oblivious Transfer</topic><topic>Random Oracle</topic><topic>Random Oracle Model</topic><topic>Security Parameter</topic><topic>Signal and communications theory</topic><topic>Software</topic><topic>Telecommunications and information theory</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Boneh, Dan</creatorcontrib><creatorcontrib>Di Crescenzo, Giovanni</creatorcontrib><creatorcontrib>Ostrovsky, Rafail</creatorcontrib><creatorcontrib>Persiano, Giuseppe</creatorcontrib><collection>ProQuest Ebook Central - Book Chapters - Demo use only</collection><collection>Pascal-Francis</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Boneh, Dan</au><au>Di Crescenzo, Giovanni</au><au>Ostrovsky, Rafail</au><au>Persiano, Giuseppe</au><au>Cachin, Christian</au><au>Camenisch, Jan</au><format>book</format><genre>bookitem</genre><ristype>CHAP</ristype><atitle>Public Key Encryption with Keyword Search</atitle><btitle>Advances in Cryptology - EUROCRYPT 2004</btitle><seriestitle>Lecture Notes in Computer Science</seriestitle><date>2004</date><risdate>2004</risdate><volume>3027</volume><spage>506</spage><epage>522</epage><pages>506-522</pages><issn>0302-9743</issn><eissn>1611-3349</eissn><isbn>9783540219354</isbn><isbn>3540219358</isbn><eisbn>3540246762</eisbn><eisbn>9783540246763</eisbn><abstract>We study the problem of searching on data that is encrypted using a public key system. Consider user Bob who sends email to user Alice encrypted under Alice’s public key. An email gateway wants to test whether the email contains the keyword “urgent” so that it could route the email accordingly. Alice, on the other hand does not wish to give the gateway the ability to decrypt all her messages. We define and construct a mechanism that enables Alice to provide a key to the gateway that enables the gateway to test whether the word “urgent” is a keyword in the email without learning anything else about the email. We refer to this mechanism as Public Key Encryption with keyword Search. As another example, consider a mail server that stores various messages publicly encrypted for Alice by others. Using our mechanism Alice can send the mail server a key that will enable the server to identify all messages containing some specific keyword, but learn nothing else. We define the concept of public key encryption with keyword search and give several constructions.</abstract><cop>Germany</cop><pub>Springer Berlin / Heidelberg</pub><doi>10.1007/978-3-540-24676-3_30</doi><oclcid>934980925</oclcid><tpages>17</tpages><oa>free_for_read</oa></addata></record> |
fulltext | fulltext |
identifier | ISSN: 0302-9743 |
ispartof | Advances in Cryptology - EUROCRYPT 2004, 2004, Vol.3027, p.506-522 |
issn | 0302-9743 1611-3349 |
language | eng |
recordid | cdi_pascalfrancis_primary_15811270 |
source | Springer Books |
subjects | Applied sciences Computer science control theory systems Computer systems and distributed systems. User interface Cryptography Encryption Scheme Exact sciences and technology Information, signal and communications theory Oblivious Transfer Random Oracle Random Oracle Model Security Parameter Signal and communications theory Software Telecommunications and information theory |
title | Public Key Encryption with Keyword Search |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-17T21%3A05%3A20IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_pasca&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=bookitem&rft.atitle=Public%20Key%20Encryption%20with%20Keyword%20Search&rft.btitle=Advances%20in%20Cryptology%20-%20EUROCRYPT%202004&rft.au=Boneh,%20Dan&rft.date=2004&rft.volume=3027&rft.spage=506&rft.epage=522&rft.pages=506-522&rft.issn=0302-9743&rft.eissn=1611-3349&rft.isbn=9783540219354&rft.isbn_list=3540219358&rft_id=info:doi/10.1007/978-3-540-24676-3_30&rft_dat=%3Cproquest_pasca%3EEBC3088562_36_518%3C/proquest_pasca%3E%3Curl%3E%3C/url%3E&rft.eisbn=3540246762&rft.eisbn_list=9783540246763&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=EBC3088562_36_518&rft_id=info:pmid/&rfr_iscdi=true |