Journal of Cryptology

, Volume 21, Issue 3, pp 350–391

Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions

  • Michel Abdalla
  • Mihir Bellare
  • Dario Catalano
  • Eike Kiltz
  • Tadayoshi Kohno
  • Tanja Lange
  • John Malone-Lee
  • Gregory Neven
  • Pascal Paillier
  • Haixia Shi
Article

DOI: 10.1007/s00145-007-9006-6

Cite this article as:
Abdalla, M., Bellare, M., Catalano, D. et al. J Cryptol (2008) 21: 350. doi:10.1007/s00145-007-9006-6

Abstract

We identify and fill some gaps with regard to consistency (the extent to which false positives are produced) for public-key encryption with keyword search (PEKS). We define computational and statistical relaxations of the existing notion of perfect consistency, show that the scheme of Boneh et al. (Advances in Cryptology—EUROCRYPT 2004, ed. by C. Cachin, J. Camenisch, pp. 506–522, 2004) is computationally consistent, and provide a new scheme that is statistically consistent. We also provide a transform of an anonymous identity-based encryption (IBE) scheme to a secure PEKS scheme that, unlike the previous one, guarantees consistency. Finally, we suggest three extensions of the basic notions considered here, namely anonymous hierarchical identity-based encryption, public-key encryption with temporary keyword search, and identity-based encryption with keyword search.

Keywords

FoundationsRandom-oracle modelAnonymityIdentity-based encryptionSearchable encryption

Copyright information

© International Association for Cryptologic Research 2007

Authors and Affiliations

  • Michel Abdalla
    • 1
  • Mihir Bellare
    • 2
  • Dario Catalano
    • 3
  • Eike Kiltz
    • 4
  • Tadayoshi Kohno
    • 5
  • Tanja Lange
    • 6
  • John Malone-Lee
    • 7
  • Gregory Neven
    • 8
  • Pascal Paillier
    • 9
  • Haixia Shi
    • 10
  1. 1.Departement d’InformatiqueÉcole Normale Supérieure & CNRSParis Cedex 05France
  2. 2.Department of Computer Science & EngineeringUniversity of California San DiegoLa JollaUSA
  3. 3.Dipartimento di Matematica e InformaticaUniversità di CataniaCataniaItaly
  4. 4.CWI AmsterdamAmsterdamThe Netherlands
  5. 5.Department of Computer Science and EngineeringUniversity of WashingtonSeattleUSA
  6. 6.Department of Mathematics and Computer ScienceEindhoven University of TechnologyEindhovenThe Netherlands
  7. 7.EMB Consultancy LLPBristolUK
  8. 8.Department of Electrical EngineeringKatholieke Universiteit LeuvenHeverlee-LeuvenBelgium
  9. 9.Cryptography & InnovationSecurity Labs, GemaltoMeudon CedexFrance
  10. 10.NVIDIA CorporationSanta ClaraUSA