Authors
Whitney A Drazen, Emmanuel Ekwedike, Rosario Gennaro
Publication date
2015/9/28
Conference
2015 IEEE Conference on communications and network security (CNS)
Pages
497-505
Publisher
IEEE
Description
In encrypted search, a server holds an encrypted database of documents but not the keys under which the documents are encrypted. The server answer keyword queries from a client with the list of documents matching the query. In this paper we present two highly scalable protocols to search over encrypted data which achieve full security against a possibly malicious server and supports conjunctive queries where the client submits many keywords and is asking the server to identify the documents that match all the keywords. The first protocol we present works in the single client model, where the party searching the data is also the data owner who originally stored with the server. The second protocol works in the more challenging multi-client model, where a data owner stores encrypted data with a server, and the allows a client to search the data via a query-based token. To be truly scalable, previous solutions for …
Total citations
2017201820192020152
Scholar articles
WA Drazen, E Ekwedike, R Gennaro - 2015 IEEE Conference on communications and …, 2015