Mukta Varsha, K. Ramana Reddy


The thought of traditional public-key file encryption by keyword search does not hold any hidden structure involving the public-key file encryption by keyword search cipher-texts correspondingly, its semantic security is just defined for your keywords and phrases. We are concerned in provision of efficient search performance missing of compromising semantic security within public-key file encryption by keyword search. Inside our work we introduce searchable public-key cipher-texts by hidden structures for keyword search as rapidly as achievable missing of compromising semantic security regarding encoded keywords and phrases. Our structure is inspired by a lot of interesting findings using the systems of on Identity-Based Key Encapsulation. Inside the recommended system, the entire keyword-searchable cipher-texts that are structured by hidden relations, by search trapdoor that suits a keyword, minimum data of relations is revealed with a search formula as management to locate the whole matching cipher-texts resourcefully.


Public-Key Encryption By Keyword Search; Semantic Security; Cipher-Texts; Trapdoor; Hidden Relations;


Abdalla M., Catalano D., Fiore D.: Verifiable Random Functions: Relations to Identity-Based Key Encapsulation and New Constructions. Journal of Cryptology, 27(3), pp. 544-593 (2013)

Freire E.S.V., Hofheinz D., Paterson K.G., Striecks C.: Programmable Hash Functions in the Multilinear Setting. In: Canetti R., Garay J.A. (eds.) Advances in Cryptology - CRYPTO 2013. LNCS, vol. 8042, pp. 513-530. Springer, Heidelberg (2013)

Garg S., Gentry C., Halevi S.: Candidate Multilinear Maps from Ideal Lattices. In: Johansson T., Nguyen P. (eds.) Advances in Cryptology - EUROCRYPT 2013. LNCS, vol. 7881, pp. 1-17. Springer, Heidelberg (2013)

Kamara S., Papamanthou C., Roeder T.: Dynamic searchable symmetric encryption. In ACM Conference on Computer and Communications Security, pp. 965976 (2012)

Kamara S., Papamanthou C.: Parallel and Dynamic Searchable Symmetric Encryption. In: Sadeghi A.-R. (ed.) FC 2013. LNCS, vol.7859, pp. 258-274. Springer, Heidelberg (2013)

Cash D., Jaeger J., Jarecki S., Jutla C., Krawczyk H., Ros M.-C., Steiner M.: Dynamic Searchable Encryption in Very Large Databases: Data Structures and Implementation. In: NDSS 2014.

Full Text: PDF


  • There are currently no refbacks.

Copyright © 2012 - 2021, All rights reserved.| ijitr.com

Creative Commons License
International Journal of Innovative Technology and Research is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJITR , Permissions beyond the scope of this license may be available at http://creativecommons.org/licenses/by/3.0/deed.en_GB.