Public Key Encryption with Keyword Search

We study the problem of searching on data that is encrypted using a public key system. Consider user Bob who sends email to user Alice encrypted under Alice’s public key. An email gateway wants to test whether the email contains the keyword “urgent” so that it could route the email accordingly. Alic...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Boneh, Dan, Di Crescenzo, Giovanni, Ostrovsky, Rafail, Persiano, Giuseppe
Format: Buchkapitel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 522
container_issue
container_start_page 506
container_title
container_volume 3027
creator Boneh, Dan
Di Crescenzo, Giovanni
Ostrovsky, Rafail
Persiano, Giuseppe
description We study the problem of searching on data that is encrypted using a public key system. Consider user Bob who sends email to user Alice encrypted under Alice’s public key. An email gateway wants to test whether the email contains the keyword “urgent” so that it could route the email accordingly. Alice, on the other hand does not wish to give the gateway the ability to decrypt all her messages. We define and construct a mechanism that enables Alice to provide a key to the gateway that enables the gateway to test whether the word “urgent” is a keyword in the email without learning anything else about the email. We refer to this mechanism as Public Key Encryption with keyword Search. As another example, consider a mail server that stores various messages publicly encrypted for Alice by others. Using our mechanism Alice can send the mail server a key that will enable the server to identify all messages containing some specific keyword, but learn nothing else. We define the concept of public key encryption with keyword search and give several constructions.
doi_str_mv 10.1007/978-3-540-24676-3_30
format Book Chapter
fullrecord <record><control><sourceid>proquest_pasca</sourceid><recordid>TN_cdi_pascalfrancis_primary_15811270</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>EBC3088562_36_518</sourcerecordid><originalsourceid>FETCH-LOGICAL-p318t-5f98667f1caad85b8492de6472f0000fb5995db0650cef3021081fea0db0f283</originalsourceid><addsrcrecordid>eNotkMtOwzAQRc1ThNI_YNENCxYGjx079hJV5SEqgUT3luPYNBCSYKeq-vc4Ld6MdOfMjHUQugZyB4QU96qQmGGeE0xzUQjMNCNH6JKlZB_QY5SBAMCM5eoETRO_74FK5RRlhBGKVZGzc5SphEiiKL9A0xi_yPiUZJJm6PZ9Uza1nb263WzR2rDrh7prZ9t6WI_ZtgvV7MOZYNdX6MybJrrpf52g1eNiNX_Gy7enl_nDEvcM5IC5V1KIwoM1ppK8lLmilRN5Qf141pdcKV6VRHBinU-fBCLBO0NS5qlkE3RzWNubaE3jg2ltHXUf6h8Tdhq4BKAFSRw9cDG12k8XdNl131ED0aM_nXxoppMRvdelR39piP0vD93vxsVBu3HKunYIprFr0w8uxERKyQXVTGgOkv0BXO1sBA</addsrcrecordid><sourcetype>Index Database</sourcetype><iscdi>true</iscdi><recordtype>book_chapter</recordtype><pqid>EBC3088562_36_518</pqid></control><display><type>book_chapter</type><title>Public Key Encryption with Keyword Search</title><source>Springer Books</source><creator>Boneh, Dan ; Di Crescenzo, Giovanni ; Ostrovsky, Rafail ; Persiano, Giuseppe</creator><contributor>Cachin, Christian ; Camenisch, Jan</contributor><creatorcontrib>Boneh, Dan ; Di Crescenzo, Giovanni ; Ostrovsky, Rafail ; Persiano, Giuseppe ; Cachin, Christian ; Camenisch, Jan</creatorcontrib><description>We study the problem of searching on data that is encrypted using a public key system. Consider user Bob who sends email to user Alice encrypted under Alice’s public key. An email gateway wants to test whether the email contains the keyword “urgent” so that it could route the email accordingly. Alice, on the other hand does not wish to give the gateway the ability to decrypt all her messages. We define and construct a mechanism that enables Alice to provide a key to the gateway that enables the gateway to test whether the word “urgent” is a keyword in the email without learning anything else about the email. We refer to this mechanism as Public Key Encryption with keyword Search. As another example, consider a mail server that stores various messages publicly encrypted for Alice by others. Using our mechanism Alice can send the mail server a key that will enable the server to identify all messages containing some specific keyword, but learn nothing else. We define the concept of public key encryption with keyword search and give several constructions.</description><identifier>ISSN: 0302-9743</identifier><identifier>ISBN: 9783540219354</identifier><identifier>ISBN: 3540219358</identifier><identifier>EISSN: 1611-3349</identifier><identifier>EISBN: 3540246762</identifier><identifier>EISBN: 9783540246763</identifier><identifier>DOI: 10.1007/978-3-540-24676-3_30</identifier><identifier>OCLC: 934980925</identifier><identifier>LCCallNum: QA268</identifier><language>eng</language><publisher>Germany: Springer Berlin / Heidelberg</publisher><subject>Applied sciences ; Computer science; control theory; systems ; Computer systems and distributed systems. User interface ; Cryptography ; Encryption Scheme ; Exact sciences and technology ; Information, signal and communications theory ; Oblivious Transfer ; Random Oracle ; Random Oracle Model ; Security Parameter ; Signal and communications theory ; Software ; Telecommunications and information theory</subject><ispartof>Advances in Cryptology - EUROCRYPT 2004, 2004, Vol.3027, p.506-522</ispartof><rights>Springer-Verlag Berlin Heidelberg 2004</rights><rights>2004 INIST-CNRS</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><relation>Lecture Notes in Computer Science</relation></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Uhttps://ebookcentral.proquest.com/covers/3088562-l.jpg</thumbnail><linktopdf>$$Uhttps://link.springer.com/content/pdf/10.1007/978-3-540-24676-3_30$$EPDF$$P50$$Gspringer$$H</linktopdf><linktohtml>$$Uhttps://link.springer.com/10.1007/978-3-540-24676-3_30$$EHTML$$P50$$Gspringer$$H</linktohtml><link.rule.ids>309,310,775,776,780,785,786,789,4036,4037,27902,38232,41418,42487</link.rule.ids><backlink>$$Uhttp://pascal-francis.inist.fr/vibad/index.php?action=getRecordDetail&amp;idt=15811270$$DView record in Pascal Francis$$Hfree_for_read</backlink></links><search><contributor>Cachin, Christian</contributor><contributor>Camenisch, Jan</contributor><creatorcontrib>Boneh, Dan</creatorcontrib><creatorcontrib>Di Crescenzo, Giovanni</creatorcontrib><creatorcontrib>Ostrovsky, Rafail</creatorcontrib><creatorcontrib>Persiano, Giuseppe</creatorcontrib><title>Public Key Encryption with Keyword Search</title><title>Advances in Cryptology - EUROCRYPT 2004</title><description>We study the problem of searching on data that is encrypted using a public key system. Consider user Bob who sends email to user Alice encrypted under Alice’s public key. An email gateway wants to test whether the email contains the keyword “urgent” so that it could route the email accordingly. Alice, on the other hand does not wish to give the gateway the ability to decrypt all her messages. We define and construct a mechanism that enables Alice to provide a key to the gateway that enables the gateway to test whether the word “urgent” is a keyword in the email without learning anything else about the email. We refer to this mechanism as Public Key Encryption with keyword Search. As another example, consider a mail server that stores various messages publicly encrypted for Alice by others. Using our mechanism Alice can send the mail server a key that will enable the server to identify all messages containing some specific keyword, but learn nothing else. We define the concept of public key encryption with keyword search and give several constructions.</description><subject>Applied sciences</subject><subject>Computer science; control theory; systems</subject><subject>Computer systems and distributed systems. User interface</subject><subject>Cryptography</subject><subject>Encryption Scheme</subject><subject>Exact sciences and technology</subject><subject>Information, signal and communications theory</subject><subject>Oblivious Transfer</subject><subject>Random Oracle</subject><subject>Random Oracle Model</subject><subject>Security Parameter</subject><subject>Signal and communications theory</subject><subject>Software</subject><subject>Telecommunications and information theory</subject><issn>0302-9743</issn><issn>1611-3349</issn><isbn>9783540219354</isbn><isbn>3540219358</isbn><isbn>3540246762</isbn><isbn>9783540246763</isbn><fulltext>true</fulltext><rsrctype>book_chapter</rsrctype><creationdate>2004</creationdate><recordtype>book_chapter</recordtype><recordid>eNotkMtOwzAQRc1ThNI_YNENCxYGjx079hJV5SEqgUT3luPYNBCSYKeq-vc4Ld6MdOfMjHUQugZyB4QU96qQmGGeE0xzUQjMNCNH6JKlZB_QY5SBAMCM5eoETRO_74FK5RRlhBGKVZGzc5SphEiiKL9A0xi_yPiUZJJm6PZ9Uza1nb263WzR2rDrh7prZ9t6WI_ZtgvV7MOZYNdX6MybJrrpf52g1eNiNX_Gy7enl_nDEvcM5IC5V1KIwoM1ppK8lLmilRN5Qf141pdcKV6VRHBinU-fBCLBO0NS5qlkE3RzWNubaE3jg2ltHXUf6h8Tdhq4BKAFSRw9cDG12k8XdNl131ED0aM_nXxoppMRvdelR39piP0vD93vxsVBu3HKunYIprFr0w8uxERKyQXVTGgOkv0BXO1sBA</recordid><startdate>2004</startdate><enddate>2004</enddate><creator>Boneh, Dan</creator><creator>Di Crescenzo, Giovanni</creator><creator>Ostrovsky, Rafail</creator><creator>Persiano, Giuseppe</creator><general>Springer Berlin / Heidelberg</general><general>Springer Berlin Heidelberg</general><general>Springer</general><scope>FFUUA</scope><scope>IQODW</scope></search><sort><creationdate>2004</creationdate><title>Public Key Encryption with Keyword Search</title><author>Boneh, Dan ; Di Crescenzo, Giovanni ; Ostrovsky, Rafail ; Persiano, Giuseppe</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-p318t-5f98667f1caad85b8492de6472f0000fb5995db0650cef3021081fea0db0f283</frbrgroupid><rsrctype>book_chapters</rsrctype><prefilter>book_chapters</prefilter><language>eng</language><creationdate>2004</creationdate><topic>Applied sciences</topic><topic>Computer science; control theory; systems</topic><topic>Computer systems and distributed systems. User interface</topic><topic>Cryptography</topic><topic>Encryption Scheme</topic><topic>Exact sciences and technology</topic><topic>Information, signal and communications theory</topic><topic>Oblivious Transfer</topic><topic>Random Oracle</topic><topic>Random Oracle Model</topic><topic>Security Parameter</topic><topic>Signal and communications theory</topic><topic>Software</topic><topic>Telecommunications and information theory</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Boneh, Dan</creatorcontrib><creatorcontrib>Di Crescenzo, Giovanni</creatorcontrib><creatorcontrib>Ostrovsky, Rafail</creatorcontrib><creatorcontrib>Persiano, Giuseppe</creatorcontrib><collection>ProQuest Ebook Central - Book Chapters - Demo use only</collection><collection>Pascal-Francis</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Boneh, Dan</au><au>Di Crescenzo, Giovanni</au><au>Ostrovsky, Rafail</au><au>Persiano, Giuseppe</au><au>Cachin, Christian</au><au>Camenisch, Jan</au><format>book</format><genre>bookitem</genre><ristype>CHAP</ristype><atitle>Public Key Encryption with Keyword Search</atitle><btitle>Advances in Cryptology - EUROCRYPT 2004</btitle><seriestitle>Lecture Notes in Computer Science</seriestitle><date>2004</date><risdate>2004</risdate><volume>3027</volume><spage>506</spage><epage>522</epage><pages>506-522</pages><issn>0302-9743</issn><eissn>1611-3349</eissn><isbn>9783540219354</isbn><isbn>3540219358</isbn><eisbn>3540246762</eisbn><eisbn>9783540246763</eisbn><abstract>We study the problem of searching on data that is encrypted using a public key system. Consider user Bob who sends email to user Alice encrypted under Alice’s public key. An email gateway wants to test whether the email contains the keyword “urgent” so that it could route the email accordingly. Alice, on the other hand does not wish to give the gateway the ability to decrypt all her messages. We define and construct a mechanism that enables Alice to provide a key to the gateway that enables the gateway to test whether the word “urgent” is a keyword in the email without learning anything else about the email. We refer to this mechanism as Public Key Encryption with keyword Search. As another example, consider a mail server that stores various messages publicly encrypted for Alice by others. Using our mechanism Alice can send the mail server a key that will enable the server to identify all messages containing some specific keyword, but learn nothing else. We define the concept of public key encryption with keyword search and give several constructions.</abstract><cop>Germany</cop><pub>Springer Berlin / Heidelberg</pub><doi>10.1007/978-3-540-24676-3_30</doi><oclcid>934980925</oclcid><tpages>17</tpages><oa>free_for_read</oa></addata></record>
fulltext fulltext
identifier ISSN: 0302-9743
ispartof Advances in Cryptology - EUROCRYPT 2004, 2004, Vol.3027, p.506-522
issn 0302-9743
1611-3349
language eng
recordid cdi_pascalfrancis_primary_15811270
source Springer Books
subjects Applied sciences
Computer science
control theory
systems
Computer systems and distributed systems. User interface
Cryptography
Encryption Scheme
Exact sciences and technology
Information, signal and communications theory
Oblivious Transfer
Random Oracle
Random Oracle Model
Security Parameter
Signal and communications theory
Software
Telecommunications and information theory
title Public Key Encryption with Keyword Search
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-17T21%3A05%3A20IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_pasca&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=bookitem&rft.atitle=Public%20Key%20Encryption%20with%20Keyword%20Search&rft.btitle=Advances%20in%20Cryptology%20-%20EUROCRYPT%202004&rft.au=Boneh,%20Dan&rft.date=2004&rft.volume=3027&rft.spage=506&rft.epage=522&rft.pages=506-522&rft.issn=0302-9743&rft.eissn=1611-3349&rft.isbn=9783540219354&rft.isbn_list=3540219358&rft_id=info:doi/10.1007/978-3-540-24676-3_30&rft_dat=%3Cproquest_pasca%3EEBC3088562_36_518%3C/proquest_pasca%3E%3Curl%3E%3C/url%3E&rft.eisbn=3540246762&rft.eisbn_list=9783540246763&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=EBC3088562_36_518&rft_id=info:pmid/&rfr_iscdi=true