2012 International Conference on Computational Intelligence and Software Engineering (CiSE 2012)(E-BOOK)

Wuhan,China,2012-12-142012-12-162012

ISBN: 978-1-61896-036-8 Scientific Research Publishing

E-Book 275pp Pub. Date: December 2012

Category: Computer Science & Communications

Price: $100

Title: Application of Secret Sharing in Public Key Encryption with Keyword Search
Source: 2012 International Conference on Computational Intelligence and Software Engineering (CiSE 2012)(E-BOOK) (pp 255-259)
Author(s): Yong Zhang, Department of Computer Science and Engineering,Shanghai Jiao Tong University,Shanghai, China
Shengli Liu, State Key Laboratory of Information Security,Institute of Software, Chinese Academy of Sciences,Beijing, China
Abstract: Dan Boneh et al. [1] proposed the public key encryption with keyword search (PEKS) scheme which enabled one to search for encrypted keywords without compromising the security of the original data. Subsequently, Joonsang Beak et al. [2] enhanced the scheme. They removed the secure channel in their scheme. In this paper we will apply secret sharing into the scheme. In our scheme we will solve two key problems. (1) the vulnerability of distributed server’s private key. (2) only one receiver can search the keyword. Consider user Bob wants to send email to Alice, Bob can encrypt the email with Alice’s public key for security. An email gateway will test whether the email contains the key “help” when Alice gives email gateway the keyword’s (“help”) trapdoor T. For removing the secure channel between email gateway and Alice, the email gateway have own private key. However, for distributed email gateway the problem of vulnerability of distributed server’s private key is exposed. In the previous model only one receiver can search keyword. It is not reasonable in some scenes. Actually we need more people can have the ability to search keyword. There is an obvious scheme. If one wants to search keyword, we can give him the entire private key. However, it is not a reasonable scheme. Because the privatekey can’t be shared also it compromises the security of private key. We will improve Joonsang Beak’s scheme [2] to satisfy above two points. After that we will prove our scheme’s security.
Free SCIRP Newsletters
Copyright © 2006-2024 Scientific Research Publishing Inc. All Rights Reserved.
Top