Skip to main content

Abstract

Public Key Encryption with Keyword Search (PEKS) allows users to search encrypted files by a specific keyword without compromising the original data security. Almost all current PEKS schemes enable users to search exact keyword only instead of imprecise keyword (such as “latest”, “biggest”, etc.). Therefore, if the keyword is fuzzy, these PEKS schemes will be terminated and then report errors. Besides, some PEKS schemes are not secure mainly because they are vulnerable to Off-line Keyword Guessing Attack (OKGA). This research paper incorporates with Mamdani Fuzzy Inference System to PEKS for supporting Fuzzy Keyword Search. Secondly, the proposed scheme is proved to be semantic secure under the random oracle models so that it is able to resist OKGA. In addition, the new scheme allows users to search multiple keywords and therefore, it could be applied to the general public networks.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Boneh, D., Di Crescenzo, G., Ostrovsky, R., Persiano, G.: Public key encryption with keyword search. In: Advances in Cryptology - EUROCRYPT, pp. 506–522 (2004)

    Chapter  Google Scholar 

  2. Baek, J., Safavi-Naini, R., Susilo, W.: Public key encryption with keyword search revisited. In: Computational Science and its Applications? ICCSA 2008, pp. 1249–1259 (2008)

    Google Scholar 

  3. Byun, J., Rhee, H., Park, H., Lee, D.: Off-line keyword guessing attacks on recent keyword search schemes over encrypted data. Lecture Notes in Computer Science, pp. 75–83 (2006)

    Google Scholar 

  4. Yau, W., Heng, S., Goi, B.: Off-line keyword guessing attacks on recent public key encryption with keyword search schemes. Lecture Notes in Computer Science, pp. 100–105 (2008)

    Google Scholar 

  5. Tang, Q., Chen, L.: Public-key encryption with registered keyword search. In: Public Key Infrastructures, Services and Applications, pp. 163–178 (2010)

    Chapter  Google Scholar 

  6. Rhee, H., Park, J., Susilo, W., Lee, D.: Trapdoor security in a searchable public-key encryption scheme with a designated tester. J. Syst. Softw. 83(5), 763–771 (2010)

    Article  Google Scholar 

  7. Wang, T., Au, M., Wu, W.: An efficient secure channel free searchable encryption scheme with multiple keywords. In: Network and System Security, vol. 9955, pp. 251–265 (2016)

    Chapter  Google Scholar 

  8. Zadeh, L.: Outline of a new approach to the analysis of complex systems and decision processes. IEEE Trans. Syst. Man Cybern SMC 3(1), 28–44 (1973)

    Article  MathSciNet  Google Scholar 

  9. Mamdani, E.H., Assilian, S.: An experiment in linguistic synthesis with a fuzzy logic controller. Int. J. Man-Mach. Stud. 7(1), 1–13 (1975)

    Article  Google Scholar 

  10. Takagi, T., Sugeno, M.: Fuzzy identification of systems and its applications to modeling and control. IEEE Trans. Syst. Man Cybern. 15, 116–132 (1985)

    Article  Google Scholar 

  11. Singh, J., Singh, N., Sharma, J.K.: Fuzzy modeling and identification of intelligent control for refrigeration compressor. J. Sci. Ind. Res. 65, 22–30 (2006)

    Google Scholar 

  12. Lermontov, A., Yokoyama, L., Lermontov, M., Machado, M.A.S.: River quality analysis using fuzzy water quality index: Ribeira do Iguape river watershed, Brazil. Ecol. Indic. 9, 1188–1197 (2009)

    Article  Google Scholar 

  13. Marchini, A., Facchinetti, T., Mistri, M.: F-IND: a framework to design fuzzy indices of environmental conditions. Ecol. Indic. 9, 485–496 (2009)

    Article  Google Scholar 

  14. De Caro, A., Iovino, V.: JPBC: Java pairing based cryptography. In: 2011 IEEE Symposium on Computers and Communications (ISCC) (2011)

    Google Scholar 

  15. Cingolani, P., Alcalá-Fdez, J.: jFuzzyLogic: a Java library to design fuzzy logic controllers according to the standard for fuzzy control programming. Int. J. Comput. Intell. Syst. 6(Supplement 1), 61–75 (2013)

    Article  Google Scholar 

  16. Cingolani, P., Alcala-Fdez, J.: jFuzzyLogic: a robust and flexible Fuzzy-Logic inference system language implementation. In: 2012 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE). IEEE (2012)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Hassan B. Kazemian .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Kazemian, H.B., Ma, Y. (2020). Fuzzy Logic Application to Searchable Cryptography. In: Iliadis, L., Angelov, P., Jayne, C., Pimenidis, E. (eds) Proceedings of the 21st EANN (Engineering Applications of Neural Networks) 2020 Conference. EANN 2020. Proceedings of the International Neural Networks Society, vol 2. Springer, Cham. https://doi.org/10.1007/978-3-030-48791-1_32

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-48791-1_32

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-48790-4

  • Online ISBN: 978-3-030-48791-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics