Definitions
Searchable encryption schemes refer to encryption schemes that allow the possibility of executing keyword search over encrypted data, without decrypting the data.
Asymmetric setting for searchable encryption refers to the operational model or family of models under which public-key encryption schemes of this class are defined.
Background
Searchable encryption schemes have been introduced in order to protect data that is stored over untrusted servers. One key issue in these contexts is the possibility of searching encrypted data without the need of decrypting it. Original encrypted data is associated with additional encrypted information that is used to evaluate predicates without releasing any information on the original data.
Searchable encryption schemes exist both in the symmetric and the asymmetric settings.
Theory
Asymmetric searchable encryption schemes have been introduced by Boneh et al. (2004).
Like asymmetric...
References
Boneh D, Waters B (2007) Conjunctive, subset, and range queries on encrypted data. In: Vadhan SP (ed) Theory of cryptography. Springer, Berlin/Heidelberg, pp 535–554
Boneh D, Di Crescenzo G, Ostrovsky R, Persiano G (2004) Public key encryption with keyword search. In: Cachin C, Camenisch J (eds) EUROCRYPT 2004. LNCS, vol 3027, pp 506–522. Springer. https://doi.org/10.1007/978-3-540-24676-3_30
Park DJ, Kim K, Lee PJ (2005) Public key encryption with conjunctive field keyword search. In: Lim CH, Yung M (eds) Information security applications (WISA 2004). Springer, Berlin/Heidelberg, pp 73–86
Shi E, Bethencourt J, Chan HT, Song DX, Perrig A (2007) Multi-dimensional range query over encrypted data. In: 2007 IEEE symposium on security and privacy (S&P 2007), 20–23 May 2007, Oakland. IEEE Computer Society, pp 350–364. https://doi.org/10.1109/SP.2007.29
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Section Editor information
Rights and permissions
Copyright information
© 2021 Springer Science+Business Media LLC
About this entry
Cite this entry
Galdi, C. (2021). Asymmetric Setting for Searchable Encryption. In: Jajodia, S., Samarati, P., Yung, M. (eds) Encyclopedia of Cryptography, Security and Privacy. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-27739-9_1482-1
Download citation
DOI: https://doi.org/10.1007/978-3-642-27739-9_1482-1
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-27739-9
Online ISBN: 978-3-642-27739-9
eBook Packages: Living Reference Computer SciencesReference Module Computer Science and Engineering