Academic literature on the topic 'Public key authenticated encryption with keyword search'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Public key authenticated encryption with keyword search.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Public key authenticated encryption with keyword search"

1

Noroozi, Mahnaz, and Ziba Eslami. "Public key authenticated encryption with keyword search: revisited." IET Information Security 13, no. 4 (2019): 336–42. http://dx.doi.org/10.1049/iet-ifs.2018.5315.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Lu, Jingwei, Hongbo Li, Jianye Huang, Sha Ma, Man Ho Allen Au, and Qiong Huang. "Certificateless Public Key Authenticated Encryption with Keyword Search Achieving Stronger Security." Information 14, no. 3 (2023): 142. http://dx.doi.org/10.3390/info14030142.

Full text
Abstract:
Transforming data into ciphertexts and storing them in the cloud database is a secure way to simplify data management. Public key encryption with keyword search (PEKS) is an important cryptographic primitive as it provides the ability to search for the desired files among ciphertexts. As a variant of PEKS, certificateless public key authenticated encryption with keyword search (CLPAEKS) not only simplifies certificate management but also could resist keyword guessing attacks (KGA). In this paper, we analyze the security models of two recent CLPAEKS schemes and find that they ignore the threat
APA, Harvard, Vancouver, ISO, and other styles
3

Du, Haorui, Jianhua Chen, Ming Chen, Cong Peng, and Debiao He. "A Lightweight Authenticated Searchable Encryption without Bilinear Pairing for Cloud Computing." Wireless Communications and Mobile Computing 2022 (October 19, 2022): 1–15. http://dx.doi.org/10.1155/2022/2336685.

Full text
Abstract:
Outsourcing data to cloud services is a good solution for users with limited computing resources. Privacy and confidentiality of data is jeopardized when data is transferred and shared in the cloud. The development of searchable cryptography offers the possibility to solve these problems. Symmetric searchable encryption (SSE) is popular among researchers because it is efficient and secure. SSE often requires the data sender and data receiver to use the same key to generate key ciphertext and trapdoor, which will obviously cause the problem of key management. Searchable encryption based on publ
APA, Harvard, Vancouver, ISO, and other styles
4

Du, Haorui, Jianhua Chen, Fei Lin, Cong Peng, and Debiao He. "A Lightweight Blockchain-based Public-Key Authenticated Encryption with Multi-Keyword Search for Cloud Computing." Security and Communication Networks 2022 (October 15, 2022): 1–15. http://dx.doi.org/10.1155/2022/2309834.

Full text
Abstract:
Cloud computing can provide users with sufficient computing resources, storage, and bandwidth to meet their needs. Data security and privacy protection are among the new threats faced by users. Searchable encryption is the combination of search technology and encryption technology. Searchable encryption can upload the user’s data to the cloud server after special encryption, and can realize the function of retrieving according to keywords. Comparatively to symmetric searchable encryption (SSE), public key searchable encryption (PEKS) simplifies key management greatly. However, most existing pu
APA, Harvard, Vancouver, ISO, and other styles
5

Qin, Baodong, Yu Chen, Qiong Huang, Ximeng Liu, and Dong Zheng. "Public-key authenticated encryption with keyword search revisited: Security model and constructions." Information Sciences 516 (April 2020): 515–28. http://dx.doi.org/10.1016/j.ins.2019.12.063.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Fan, Yajun, Baodong Qin, and Dong Zheng. "A lattice-based designated-server public-key authenticated encryption with keyword search." Journal of Systems Architecture 145 (December 2023): 103031. http://dx.doi.org/10.1016/j.sysarc.2023.103031.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Chi, Tianyu, Baodong Qin, and Dong Zheng. "An Efficient Searchable Public-Key Authenticated Encryption for Cloud-Assisted Medical Internet of Things." Wireless Communications and Mobile Computing 2020 (July 14, 2020): 1–11. http://dx.doi.org/10.1155/2020/8816172.

Full text
Abstract:
In recent years, it has become popular to upload patients’ medical data to a third-party cloud server (TCS) for storage through medical Internet of things. It can reduce the local maintenance burden of the medical data and importantly improve accuracy in the medical treatment. As remote TCS cannot be fully trusted, medical data should be encrypted before uploading, to protect patients’ privacy. However, encryption makes search capabilities difficult for patients and doctors. To address this issue, Huang et al. recently put forward the notion of Public-key Authenticated Encryption with Keyword
APA, Harvard, Vancouver, ISO, and other styles
8

He, Debiao, Mimi Ma, Sherali Zeadally, Neeraj Kumar, and Kaitai Liang. "Certificateless Public Key Authenticated Encryption With Keyword Search for Industrial Internet of Things." IEEE Transactions on Industrial Informatics 14, no. 8 (2018): 3618–27. http://dx.doi.org/10.1109/tii.2017.2771382.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Emura, Keita. "Generic Construction of Fully Anonymous Broadcast Authenticated Encryption with Keyword Search with Adaptive Corruptions." IET Information Security 2023 (November 7, 2023): 1–12. http://dx.doi.org/10.1049/2023/9922828.

Full text
Abstract:
As a multireceiver variant of public key authenticated encryption with keyword search (PAEKS), broadcast authenticated encryption with keyword search (BAEKS) was proposed by Liu et al. (ACISP 2021). BAEKS focuses on receiver anonymity, where no information about the receiver is leaked from ciphertexts, which is reminiscent of the anonymous broadcast encryption. Here, there are rooms for improving their security definitions, e.g., two challenge sets of receivers are selected before the setup phase, and an adversary is not allowed to corrupt any receiver. In this paper, we propose a generic cons
APA, Harvard, Vancouver, ISO, and other styles
10

Ma, Yang, and Hassan Kazemian. "Public key authenticated encryption with multiple keywords search using Mamdani system." Evolving Systems 12, no. 3 (2021): 687–99. http://dx.doi.org/10.1007/s12530-021-09387-0.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Public key authenticated encryption with keyword search"

1

Cheng, Leixiao, and Fei Meng. "Public Key Authenticated Encryption with Keyword Search from LWE." In Computer Security – ESORICS 2022. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-17140-6_15.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

He, Kejin, Sha Ma, and Hao Wang. "Multi-recipient Public-Key Authenticated Encryption with Keyword Search." In Intelligence Computation and Applications. Springer Nature Singapore, 2024. http://dx.doi.org/10.1007/978-981-97-4396-4_27.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Qin, Baodong, Hui Cui, Xiaokun Zheng, and Dong Zheng. "Improved Security Model for Public-Key Authenticated Encryption with Keyword Search." In Provable and Practical Security. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-90402-9_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Wu, Tsu-Yang, Chien-Ming Chen, King-Hang Wang, Jimmy Ming-Tai Wu, and Jeng-Shyang Pan. "Security Analysis of a Public Key Authenticated Encryption with Keyword Search Scheme." In Recent Advances in Intelligent Information Hiding and Multimedia Signal Processing. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-03745-1_22.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Liu, Xueqiao, Hongbo Li, Guomin Yang, Willy Susilo, Joseph Tonien, and Qiong Huang. "Towards Enhanced Security for Certificateless Public-Key Authenticated Encryption with Keyword Search." In Provable Security. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-31919-9_7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Yang, Pan, Hongbo Li, Jianye Huang, Hao Zhang, Man Ho Au, and Qiong Huang. "Secure-Channel Free Certificateless Searchable Public Key Authenticated Encryption with Keyword Search." In Provable and Practical Security. Springer Nature Switzerland, 2022. http://dx.doi.org/10.1007/978-3-031-20917-8_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Emura, Keita. "Generic Construction of Forward Secure Public Key Authenticated Encryption with Keyword Search." In Applied Cryptography and Network Security. Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-54770-6_10.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Yang, Guiquan, Sha Ma, Hongbo Li, Husheng Yang, and Qiong Huang. "Public Key Authenticated Encryption with Keyword Search Improved: Strong Security Model and Multi-keyword Construction." In Information Security and Cryptology. Springer Nature Singapore, 2024. http://dx.doi.org/10.1007/978-981-97-0942-7_15.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Boneh, Dan, Giovanni Di Crescenzo, Rafail Ostrovsky, and Giuseppe Persiano. "Public Key Encryption with Keyword Search." In Advances in Cryptology - EUROCRYPT 2004. Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-24676-3_30.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Hu, Chengyu, Peng He, and Pengtao Liu. "Public Key Encryption with Multi-keyword Search." In Communications in Computer and Information Science. Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-35211-9_72.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Public key authenticated encryption with keyword search"

1

Singh, Akansha, Venkata Bhikshapathi Chenam, and Syed Taqi Ali. "Enhanced provably secure public key encryption with keyword search scheme for secure cloud-based keyword search." In 2024 15th International Conference on Computing Communication and Networking Technologies (ICCCNT). IEEE, 2024. http://dx.doi.org/10.1109/icccnt61001.2024.10725485.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Liu, Zi-Yuan, Yi-Fan Tseng, Raylin Tso, Masahiro Mambo, and Yu-Chi Chen. "Public-key Authenticated Encryption with Keyword Search." In ASIA CCS '22: ACM Asia Conference on Computer and Communications Security. ACM, 2022. http://dx.doi.org/10.1145/3488932.3497760.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Chan, Koon-Ming, Swee-Huay Heng, Syh-Yuan Tan, and Shing-Chiang Tan. "K-Resilient Public Key Authenticated Encryption with Keyword Search." In 21st International Conference on Security and Cryptography. SCITEPRESS - Science and Technology Publications, 2024. http://dx.doi.org/10.5220/0012716100003767.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Emura, Keita. "Generic Construction of Public-key Authenticated Encryption with Keyword Search Revisited." In ASIA CCS '22: ACM Asia Conference on Computer and Communications Security. ACM, 2022. http://dx.doi.org/10.1145/3494105.3526237.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Wang, Zhaoli, Jinli Han, Meijuan Wang, Yaqing Shi, and Hui Dong. "Public Key Encryption with Wildcards Keyword Search." In 2018 Eighth International Conference on Instrumentation & Measurement, Computer, Communication and Control (IMCCC). IEEE, 2018. http://dx.doi.org/10.1109/imccc.2018.00119.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

xu, Wujing, Xiaolei Dong, Zhenfu Cao, and Jiachen Shen. "Revocable Public Key Encryption with Authorized Keyword Search." In 2019 IEEE 3rd Information Technology, Networking, Electronic and Automation Control Conference (ITNEC). IEEE, 2019. http://dx.doi.org/10.1109/itnec.2019.8729491.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Hou, Changjiang, Fei Liu, Hongtao Bai, and Lanfang Ren. "Public-Key Encryption with Keyword Search from Lattice." In 2013 Eighth International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC). IEEE, 2013. http://dx.doi.org/10.1109/3pgcic.2013.57.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Hu, Chengyu, and Pengtao Liu. "Public Key Encryption with Ranked Multi-keyword Search." In 2013 International Conference on Intelligent Networking and Collaborative Systems (INCoS). IEEE, 2013. http://dx.doi.org/10.1109/incos.2013.24.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Luo, Wenjun, and Jianming Tan. "Public key encryption with keyword search based on factoring." In 2012 IEEE 2nd International Conference on Cloud Computing and Intelligence Systems (CCIS). IEEE, 2012. http://dx.doi.org/10.1109/ccis.2012.6664583.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Guo Duntao, Huang Dawei, Chen Haibin, and Yang Xiaoyuan. "A new public key encryption with temporary keyword search." In 2010 International Conference on Computer, Mechatronics, Control and Electronic Engineering (CMCE 2010). IEEE, 2010. http://dx.doi.org/10.1109/cmce.2010.5610216.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!