Secure keyword search using bloom filter with specified character positions

Takanori Suga, Takashi Nishide, Kouichi Sakurai

研究成果: 著書/レポートタイプへの貢献会議での発言

14 引用 (Scopus)

抄録

There are encryption schemes called searchable encryption which enable keyword searches. Traditional symmetric ones support only full keyword matches. Therefore, both a data owner and data searcher have to enumerate all possible keywords to realize a variety of searches. It causes increases of data size and run time.We propose searchable symmetric encryption which can check characters in the specified position as we perform search on plaintexts. Our scheme realizes a variety of searches such as fuzzy keyword search, wildcard search, and so on.

元の言語英語
ホスト出版物のタイトルProvable Security - 6th International Conference, ProvSec 2012, Proceedings
ページ235-252
ページ数18
DOI
出版物ステータス出版済み - 9 14 2012
イベント6th International Conference on Provable Security, ProvSec 2012 - Chengdu, 中国
継続期間: 9 26 20129 28 2012

出版物シリーズ

名前Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
7496 LNCS
ISSN(印刷物)0302-9743
ISSN(電子版)1611-3349

その他

その他6th International Conference on Provable Security, ProvSec 2012
中国
Chengdu
期間9/26/129/28/12

Fingerprint

Bloom Filter
Keyword Search
Cryptography
Encryption
Character

All Science Journal Classification (ASJC) codes

  • Theoretical Computer Science
  • Computer Science(all)

これを引用

Suga, T., Nishide, T., & Sakurai, K. (2012). Secure keyword search using bloom filter with specified character positions. : Provable Security - 6th International Conference, ProvSec 2012, Proceedings (pp. 235-252). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 巻数 7496 LNCS). https://doi.org/10.1007/978-3-642-33272-2_15

Secure keyword search using bloom filter with specified character positions. / Suga, Takanori; Nishide, Takashi; Sakurai, Kouichi.

Provable Security - 6th International Conference, ProvSec 2012, Proceedings. 2012. p. 235-252 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 巻 7496 LNCS).

研究成果: 著書/レポートタイプへの貢献会議での発言

Suga, T, Nishide, T & Sakurai, K 2012, Secure keyword search using bloom filter with specified character positions. : Provable Security - 6th International Conference, ProvSec 2012, Proceedings. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 巻. 7496 LNCS, pp. 235-252, 6th International Conference on Provable Security, ProvSec 2012, Chengdu, 中国, 9/26/12. https://doi.org/10.1007/978-3-642-33272-2_15
Suga T, Nishide T, Sakurai K. Secure keyword search using bloom filter with specified character positions. : Provable Security - 6th International Conference, ProvSec 2012, Proceedings. 2012. p. 235-252. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)). https://doi.org/10.1007/978-3-642-33272-2_15
Suga, Takanori ; Nishide, Takashi ; Sakurai, Kouichi. / Secure keyword search using bloom filter with specified character positions. Provable Security - 6th International Conference, ProvSec 2012, Proceedings. 2012. pp. 235-252 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)).
@inproceedings{7a578cf1ad5544358efdb4b1a0d890fa,
title = "Secure keyword search using bloom filter with specified character positions",
abstract = "There are encryption schemes called searchable encryption which enable keyword searches. Traditional symmetric ones support only full keyword matches. Therefore, both a data owner and data searcher have to enumerate all possible keywords to realize a variety of searches. It causes increases of data size and run time.We propose searchable symmetric encryption which can check characters in the specified position as we perform search on plaintexts. Our scheme realizes a variety of searches such as fuzzy keyword search, wildcard search, and so on.",
author = "Takanori Suga and Takashi Nishide and Kouichi Sakurai",
year = "2012",
month = "9",
day = "14",
doi = "10.1007/978-3-642-33272-2_15",
language = "English",
isbn = "9783642332715",
series = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",
pages = "235--252",
booktitle = "Provable Security - 6th International Conference, ProvSec 2012, Proceedings",

}

TY - GEN

T1 - Secure keyword search using bloom filter with specified character positions

AU - Suga, Takanori

AU - Nishide, Takashi

AU - Sakurai, Kouichi

PY - 2012/9/14

Y1 - 2012/9/14

N2 - There are encryption schemes called searchable encryption which enable keyword searches. Traditional symmetric ones support only full keyword matches. Therefore, both a data owner and data searcher have to enumerate all possible keywords to realize a variety of searches. It causes increases of data size and run time.We propose searchable symmetric encryption which can check characters in the specified position as we perform search on plaintexts. Our scheme realizes a variety of searches such as fuzzy keyword search, wildcard search, and so on.

AB - There are encryption schemes called searchable encryption which enable keyword searches. Traditional symmetric ones support only full keyword matches. Therefore, both a data owner and data searcher have to enumerate all possible keywords to realize a variety of searches. It causes increases of data size and run time.We propose searchable symmetric encryption which can check characters in the specified position as we perform search on plaintexts. Our scheme realizes a variety of searches such as fuzzy keyword search, wildcard search, and so on.

UR - http://www.scopus.com/inward/record.url?scp=84866039014&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84866039014&partnerID=8YFLogxK

U2 - 10.1007/978-3-642-33272-2_15

DO - 10.1007/978-3-642-33272-2_15

M3 - Conference contribution

AN - SCOPUS:84866039014

SN - 9783642332715

T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

SP - 235

EP - 252

BT - Provable Security - 6th International Conference, ProvSec 2012, Proceedings

ER -