Bilinear Complexity Assumptions

Superior Essays
1.2. Previous Work
The first symmetric key schemes for keyword search over encrypted data are proposed in [27]. The authors consider a setting in which the sender of file encrypts each word of a file separately. Goh [15] proposed a method for secure index using Bloom filters and introduced the notion of semantic security against adaptive chosen-keyword attacks. Determining whether a file contains a keyword can be done securely in constant time. In the public key setting, Boneh et al.[5] first proposed public key scheme for keyword search, where anyone can use public key and write to the data stored on remote server, but only authorized recipients with the secret key can search. An efficient implementation of a public key work for keyword search
…show more content…
Section 2 gives the preliminaries. Then we introduce the outline of the proposed scheme, notations, semantic security of the SSE-KFF-CKS scheme and construction of SSE-KFF-CKS in Section 3. Section 4 introduces the security analysis. Finally, Section 5 provides brief conclusions. PRELIMINARIES
2.1. The Bilinear Pairings and Complexity Assumptions
We briefly show theoretical background and complexity assumptions that used throughout our paper. Bilinear maps: We say a map e ̂:G_1×G_1→ G_2 is a bilinear map if the following properties hold: G_1and G_2are cyclic groups of the same prime order q and e ̂(g,g) is efficiently computable; For all a,b∈Z_q and g∈G_1, then e ̂(g^a,g^b) = e ̂〖(g,g)〗^ab; e ̂(g,g) is non-degenerate. That is, if g generates G_1 the e ̂(g,g) generates G_2.
The above bilinear map is called symmetric pairings. Decisional Diffie-Hellman (DDH) problem: We say that the decisional Diffie-Hellman (DDH) problem is hard if, for any PPT distinguisher A, the function
|Pr⁡[A(G_1,q,g,g^a,g^b,g^c )=1]-Pr⁡[A(G_1,q,g,g^a,g^b,g^ab )=1]|, is negligible.
2.2. Outline of the Conjunctive Keyword Searchable Encryption [16]
A conjunctive keyword searchable encryption (CKSE) consists of the following four algorithms: KeyGen(1^k): It is run by the senders to initiate the scheme. It takes a security parameter k, and returns a secret key
…show more content…
This algorithm takes the security parameter σ as input to create the following parameters: q as a large prime, two groups G_1,G_2 of order q and a bilinear map e ̂:G_1×G_1→ G_2,g is a random generator of G_1, e is random element of Z_q^* and one cryptographic hash Functions H:〖{0,1}〗^*⟶G_1. FilEncrypt: To protect data privacy and undesired accesses, the file collection F should be encrypted before outsourcing them onto remote servers which are not within their trusted domains. To do so, S encrypts each file F_i∈F using a standard symmetric encryption algorithm(AES). Each file F_i comprising of an unique identifier 〖ID〗_i∈〖{0,1}〗^n. To protect the file identifiers 〖ID〗_i, S encrypts this 〖DI〗_i also with AES encryption technique, such technique assurances that if the same file identifier is encrypted multiple times, it will create different ciphertexts but all decrypted to the same value. KeyEncrypt: S extracts the conjunctive keyword W_(F_i ) from each file F_i∈F and encrypts them. To do so, the sender creates m! possible permutations set of these keywords sequence P_(F_i )={〖Pr〗_1,〖Pr〗_2,…,〖Pr〗_m! } and makes each permutation 〖Pr〗_j looks like one keyword using concatenation operation as 〖Pr〗_j={W_1 || W_2 ||...||W_m}, where j = 1,...,m!, then he chooses a random number f∈Z_q^*. Finally the algorithm KeyEncrypt returns C_j for each permutation 〖Pr〗_j as

Related Documents

  • Great Essays

    Nt1310 Unit 1 Assignment 1

    • 1362 Words
    • 6 Pages

    In practice, this code generally takes four or more. 2. In order to attack the NTH +1 or n+2 rounds of the password, believe the password analysis, the difference cipher analysis and the truncation analysis attack usually adopt a propagation path up to n wheel. The same is true of infiltration attacks, which use a four-wheel communication structure to attack six rounds. In this respect, we increase the four wheel in fact to double the number of rounds that are traversing the track.…

    • 1362 Words
    • 6 Pages
    Great Essays
  • Decent Essays

    Pt2520 Unit 1 Assignment

    • 382 Words
    • 2 Pages

    The encryption and decoding cloud benefit had no power to store the information either in the scrambled shape or unscrambled frame on a similar cloud benefit. So this cloud naturally erases the information subsequent to sending it to its appropriate assignment. This will expand the information security. After information sends to the Capacity Cloud Benefit, here the information is put away in the scrambled frame along with the client Id. This will help in future to recognize and separate the information of numerous clients.…

    • 382 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Nt1330 Unit 5 Algorithm

    • 689 Words
    • 3 Pages

    CFS has been reported in [40]. CFS pushes encryption services into the file system. CFS supports secure storage at the system level through a standard UNIX file system interface to encrypted files. Users associate a cryptographic key with the directories they wish to protect. Files in these directories are transparently encrypted and decrypted with the specified key without further user intervention; cleartext is never stored on a disk or sent to a remote file server.…

    • 689 Words
    • 3 Pages
    Improved Essays
  • Great Essays

    Nt1330 Unit 3

    • 1174 Words
    • 5 Pages

    Its purpose is to provide a secure connection between a client and server across a public network for data transfer or remote operation. When SSH is evoked, the client will begin the initial TCP handshake by distributing its public key with the server. Once received, the server will use that key to encrypt a session key that is then returned over the network. When the client receives this encrypted session key it uses its private key to decrypt it. Now the client and server both share the same session key…

    • 1174 Words
    • 5 Pages
    Great Essays
  • Decent Essays

    repository or central database and trusted third party Central authority(CA) are used to revoke, issue and store the keys. There is always a risk that these centralized infrastructure can be violated. Hence, Blochcain can be use to to reduce the risks of storing PKI on centralized infrastructure. Here the Data(Keys) will be distributed across the blochchain network[3] In the 2nd section we will go through the introduction of blockchain,…

    • 625 Words
    • 3 Pages
    Decent Essays
  • Great Essays

    Nt1330 Unit 3 Assignment 1

    • 1044 Words
    • 5 Pages

    Encrypting data is vital for a network as many hackers are seeking to find the easiest way to steal data. If data is left in plain text the hacker would have data and other important information at their disposal. Therefore,…

    • 1044 Words
    • 5 Pages
    Great Essays
  • Decent Essays

    The following shows the corresponding numbers of each day of the week Monday – 1 Friday - 5 Tuesday – 2 Saturday - 6 Wednesday – 3 Sunday - 7 Thursday – 4 Example 7-4: If today is Friday, what day of the week is 6 days after today? Solution: Since Friday is associated with number 5, we need to add 6 to 5.…

    • 293 Words
    • 2 Pages
    Decent Essays
  • Great Essays

    c. Data computing The IoT devices are going to handle a lot of information for better consumer experience. This information needs to be analyzed and processed in real time. If the data is not processed in an appropriate time frame, then that would lead to consumer dissatisfaction. Moreover, the issue lies in the amount of data that will be generated from the IoT devices.…

    • 1436 Words
    • 6 Pages
    Great Essays
  • Improved Essays

    Nt1330 Unit 1 Essay

    • 639 Words
    • 3 Pages

    RQ 1 A function for one block of bits in a hash function is referred to as a compression function. RQ 2 The main arithmetic and logical functions in SHA algorithms include AND, OR, NOT, XOR and the circular shift. RQ 3…

    • 639 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Certification Authority(CA):A certification Authority which is having private and public key pairs and trusted by sensors. The role of the CA in this process is to guarantee that the individual granted the unique certificate is in the fact who he or she claims to be. External Agent(EA):External Agent is an entity who tries communicate with the WSN.External agent agent also has a private and public key pair and the public key must be certified the CA.…

    • 637 Words
    • 3 Pages
    Improved Essays
  • Great Essays

    Nt1310 Unit 9

    • 1390 Words
    • 6 Pages

    UML 91.561 Computer & Network Security I HomeWork 1 Name – Nrupen Abnave Student ID -01382247 1.1 (a) Describe the major structure of a TCP packet and explain the main functions of the TCP headers. - TCP is a transport layer protocol and is connection oriented. Its reliable connection, has error checking and flow control.…

    • 1390 Words
    • 6 Pages
    Great Essays
  • Improved Essays

    1) Eavesdropping: It can be defined as secretly listening to the private conversation of others without their consent. Here an attacker can choose to passively eavesdrop on the network communication and steal the data. Through passive eavesdropping attackers apparently eliminate their presence in the network and make such attacks difficult to detect. The goal of such an attack is to violate the confidentiality of the communications by intercepting the network and sniffing or listening to the routing packets. Also, an adversary can actively influence the communication channel by disrupting, jamming or modifying the network packets and/or inserting false packets into the network.…

    • 869 Words
    • 4 Pages
    Improved Essays
  • Decent Essays

    Information security policy is to protect the data and assets. We can apply policies to the users. What to access and what not to access. These security policies can protect the networks, computers, applications of the company.…

    • 342 Words
    • 2 Pages
    Decent Essays
  • Superior Essays

    CHAPTER 4 PSO AND GA TECHNIQUE 4.1 Moth Flame Optimization In the proposed MFO algorithm, I assumed that the candidate solutions are moths and the problem’s variables are the position of moths in the space. Therefore, the moths can fly in 1-D, 2-D, 3-D, or hyper dimensional space with changing their position vectors. Since the MFO algorithm is a population-based algorithm. It should be noted here that moths and flames are both solutions.…

    • 1603 Words
    • 7 Pages
    Superior Essays
  • Improved Essays

    Divide and Conquer Strategies: Divide and conquer is an algorithm which design paradigm based on multi-branched recursion. This designed paradigm consists of following phases: 1) Break the problem (divide): Breaking the problem into several sub-problems that are smaller in size. 2) Solve the sub problem(conquer) : Solve the sub-problem recursively .…

    • 718 Words
    • 3 Pages
    Improved Essays