Skip to main content

An Efficient Searchable Encryption Scheme in the Multi-user Environment

  • Conference paper
  • First Online:

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 502))

Abstract

Searchable encryption scheme is a cryptographic one that allows search of specific information in an encrypted content without decryption. There have been two main issues with searchable encryption: search time and extension from single reader to multi-reader setting. In this paper, we propose an efficient searchable symmetric encryption scheme by solving these issues.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD   169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Notes

  1. 1.

    d is the size of document collection and A, \(d'=d\) in the case all keyword \(w_i\) appears only once in a document in D.

References

  1. Curtmola, R., Garay, J., Kamara, S., Ostrovsky, R.: Searchable symmetric encryption: improved definitions and efficient constructions. J. Comput. Secur. 19(5), 895–934 (2011)

    Article  Google Scholar 

  2. Song, D. X., Wagner, D., Perrig, A.: Practical techniques for searches on encrypted data. In: Proceedings of the 2000 IEEE Symposium on Security and Privacy, pp. 44–55. IEEE Computer Society, IEEE (2000)

    Google Scholar 

  3. Hwang, Y.H., Lee, P.J.: Public key encryption with conjunctive keyword search and its extension to a multi-user system. In: International Conference on Pairing-Based Cryptography. LNCS, vol. 4575, pp. 2–22. Springer, Heidelberg (2007)

    Google Scholar 

  4. Boneh, D., Di Crescenzo, G., Ostrovsky, R., Persiano, G.: Public key encryption with keyword search. In: International Conference on the Theory and Applications of Cryptographic Techniques. LNCS, vol. 3027, pp. 506–522. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  5. Dong, C., Russello, G., Dulay, N.: Shared and searchable encrypted data for untrusted servers. IFIP Annual Conference on Data and Applications Security and Privacy. LNCS, vol. 5094, pp. 127–143. Springer, Heidelberg (2008)

    Google Scholar 

Download references

Acknowledgment

This work was supported by the National Research Foundation of Korea(NRF) grant funded by the Korea government(MSIP) (No. 2017R1A2B4001801).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Seong Oun Hwang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Kim, I.T., Quan, T.H., Duc, L.V., Nguyen, T.K., Hwang, S.O. (2019). An Efficient Searchable Encryption Scheme in the Multi-user Environment. In: Hwang, S., Tan, S., Bien, F. (eds) Proceedings of the Sixth International Conference on Green and Human Information Technology. ICGHIT 2018. Lecture Notes in Electrical Engineering, vol 502. Springer, Singapore. https://doi.org/10.1007/978-981-13-0311-1_31

Download citation

  • DOI: https://doi.org/10.1007/978-981-13-0311-1_31

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-13-0310-4

  • Online ISBN: 978-981-13-0311-1

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics