Advertisement

Secure searchable public key encryption against insider keyword guessing attacks from indistinguishability obfuscation

  • Lixue Sun
  • Chunxiang Xu
  • Mingwu Zhang
  • Kefei Chen
  • Hongwei Li
Highlight

Notes

Acknowledgements

This work was supported in part by National Natural Science Foundation of China (Grant No. 61370203) and National Science and Technology Major Project (Grant No. 2017YFB0802003).

Supplementary material

11432_2017_9124_MOESM1_ESM.pdf (73 kb)
Supplementary material, approximately 73 KB.

References

  1. 1.
    Boneh D, Di Crescenzo G, Ostrovsky R, et al. Public key encryption with keyword search. In: Advances in Cryptology-Eurocrypt 2004. Berlin: Springer, 2004. 506–522MATHGoogle Scholar
  2. 2.
    Byun JW, Rhee H S, Park H A, et al. Off-line keyword guessing attacks on recent keyword search schemes over encrypted data. In: Proceedings of Workshop on Secure Data Management, Seoul, 2006. 75–83Google Scholar
  3. 3.
    Jiang P, Mu Y, Guo F C, et al. Online/offline ciphertext retrieval on resource constrained devices. Comput J, 2016, 59: 955–969CrossRefGoogle Scholar
  4. 4.
    Cheng R, Yan J B, Guan CW, et al. Verifiable searchable symmetric encryption from indistinguishability obfuscation. In: Proceedings of ACM Symposium on Information, Computer and Communications Security, Singapore, 2015. 621–626Google Scholar
  5. 5.
    Zhang Y, Xu C X, Liang X H, et al. Efficient public verification of data integrity for cloud storage systems from indistinguishability obfuscation. IEEE Trans Inf Foren Secur, 2016, 12: 676–688CrossRefGoogle Scholar
  6. 6.
    Barak B, Goldreich O, Impagliazzo R, et al. On the (im) possibility of obfuscating programs. In: Proceedings of the 21st Annual International Cryptology Conference on Advances in Cryptology, Santa Barbara, 2001. 1–18MATHGoogle Scholar
  7. 7.
    Garg S, Gentry C, Halevi S, et al. Candidate indistinguishability obfuscation and functional encryption for all circuits. In: Proceedings of IEEE 54th Annual Symposium on Foundations of Computer Science (FOCS), Berkeley, 2013. 40–49MATHGoogle Scholar

Copyright information

© Science China Press and Springer-Verlag GmbH Germany 2017

Authors and Affiliations

  • Lixue Sun
    • 1
  • Chunxiang Xu
    • 1
  • Mingwu Zhang
    • 2
  • Kefei Chen
    • 3
    • 4
  • Hongwei Li
    • 1
  1. 1.Center for Cyber Security, School of Computer Science and EngineeringUniversity of Electronic Science and Technology of ChinaChengduChina
  2. 2.School of Computer ScienceHubei University of TechnologyWuhanChina
  3. 3.School of ScienceHangzhou Normal UniversityHangzhouChina
  4. 4.Laboratory of Science and Technology on Communication SecurityChengduChina

Personalised recommendations