To see the other types of publications on this topic, follow the link: Public key authenticated encryption with keyword search.

Journal articles on the topic 'Public key authenticated encryption with keyword search'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Public key authenticated encryption with keyword search.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Noroozi, Mahnaz, and Ziba Eslami. "Public key authenticated encryption with keyword search: revisited." IET Information Security 13, no. 4 (2019): 336–42. http://dx.doi.org/10.1049/iet-ifs.2018.5315.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Lu, Jingwei, Hongbo Li, Jianye Huang, Sha Ma, Man Ho Allen Au, and Qiong Huang. "Certificateless Public Key Authenticated Encryption with Keyword Search Achieving Stronger Security." Information 14, no. 3 (2023): 142. http://dx.doi.org/10.3390/info14030142.

Full text
Abstract:
Transforming data into ciphertexts and storing them in the cloud database is a secure way to simplify data management. Public key encryption with keyword search (PEKS) is an important cryptographic primitive as it provides the ability to search for the desired files among ciphertexts. As a variant of PEKS, certificateless public key authenticated encryption with keyword search (CLPAEKS) not only simplifies certificate management but also could resist keyword guessing attacks (KGA). In this paper, we analyze the security models of two recent CLPAEKS schemes and find that they ignore the threat
APA, Harvard, Vancouver, ISO, and other styles
3

Du, Haorui, Jianhua Chen, Ming Chen, Cong Peng, and Debiao He. "A Lightweight Authenticated Searchable Encryption without Bilinear Pairing for Cloud Computing." Wireless Communications and Mobile Computing 2022 (October 19, 2022): 1–15. http://dx.doi.org/10.1155/2022/2336685.

Full text
Abstract:
Outsourcing data to cloud services is a good solution for users with limited computing resources. Privacy and confidentiality of data is jeopardized when data is transferred and shared in the cloud. The development of searchable cryptography offers the possibility to solve these problems. Symmetric searchable encryption (SSE) is popular among researchers because it is efficient and secure. SSE often requires the data sender and data receiver to use the same key to generate key ciphertext and trapdoor, which will obviously cause the problem of key management. Searchable encryption based on publ
APA, Harvard, Vancouver, ISO, and other styles
4

Du, Haorui, Jianhua Chen, Fei Lin, Cong Peng, and Debiao He. "A Lightweight Blockchain-based Public-Key Authenticated Encryption with Multi-Keyword Search for Cloud Computing." Security and Communication Networks 2022 (October 15, 2022): 1–15. http://dx.doi.org/10.1155/2022/2309834.

Full text
Abstract:
Cloud computing can provide users with sufficient computing resources, storage, and bandwidth to meet their needs. Data security and privacy protection are among the new threats faced by users. Searchable encryption is the combination of search technology and encryption technology. Searchable encryption can upload the user’s data to the cloud server after special encryption, and can realize the function of retrieving according to keywords. Comparatively to symmetric searchable encryption (SSE), public key searchable encryption (PEKS) simplifies key management greatly. However, most existing pu
APA, Harvard, Vancouver, ISO, and other styles
5

Qin, Baodong, Yu Chen, Qiong Huang, Ximeng Liu, and Dong Zheng. "Public-key authenticated encryption with keyword search revisited: Security model and constructions." Information Sciences 516 (April 2020): 515–28. http://dx.doi.org/10.1016/j.ins.2019.12.063.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Fan, Yajun, Baodong Qin, and Dong Zheng. "A lattice-based designated-server public-key authenticated encryption with keyword search." Journal of Systems Architecture 145 (December 2023): 103031. http://dx.doi.org/10.1016/j.sysarc.2023.103031.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Chi, Tianyu, Baodong Qin, and Dong Zheng. "An Efficient Searchable Public-Key Authenticated Encryption for Cloud-Assisted Medical Internet of Things." Wireless Communications and Mobile Computing 2020 (July 14, 2020): 1–11. http://dx.doi.org/10.1155/2020/8816172.

Full text
Abstract:
In recent years, it has become popular to upload patients’ medical data to a third-party cloud server (TCS) for storage through medical Internet of things. It can reduce the local maintenance burden of the medical data and importantly improve accuracy in the medical treatment. As remote TCS cannot be fully trusted, medical data should be encrypted before uploading, to protect patients’ privacy. However, encryption makes search capabilities difficult for patients and doctors. To address this issue, Huang et al. recently put forward the notion of Public-key Authenticated Encryption with Keyword
APA, Harvard, Vancouver, ISO, and other styles
8

He, Debiao, Mimi Ma, Sherali Zeadally, Neeraj Kumar, and Kaitai Liang. "Certificateless Public Key Authenticated Encryption With Keyword Search for Industrial Internet of Things." IEEE Transactions on Industrial Informatics 14, no. 8 (2018): 3618–27. http://dx.doi.org/10.1109/tii.2017.2771382.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Emura, Keita. "Generic Construction of Fully Anonymous Broadcast Authenticated Encryption with Keyword Search with Adaptive Corruptions." IET Information Security 2023 (November 7, 2023): 1–12. http://dx.doi.org/10.1049/2023/9922828.

Full text
Abstract:
As a multireceiver variant of public key authenticated encryption with keyword search (PAEKS), broadcast authenticated encryption with keyword search (BAEKS) was proposed by Liu et al. (ACISP 2021). BAEKS focuses on receiver anonymity, where no information about the receiver is leaked from ciphertexts, which is reminiscent of the anonymous broadcast encryption. Here, there are rooms for improving their security definitions, e.g., two challenge sets of receivers are selected before the setup phase, and an adversary is not allowed to corrupt any receiver. In this paper, we propose a generic cons
APA, Harvard, Vancouver, ISO, and other styles
10

Ma, Yang, and Hassan Kazemian. "Public key authenticated encryption with multiple keywords search using Mamdani system." Evolving Systems 12, no. 3 (2021): 687–99. http://dx.doi.org/10.1007/s12530-021-09387-0.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Pan, Xiangyu, and Fagen Li. "Public-key authenticated encryption with keyword search achieving both multi-ciphertext and multi-trapdoor indistinguishability." Journal of Systems Architecture 115 (May 2021): 102075. http://dx.doi.org/10.1016/j.sysarc.2021.102075.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Han, Lidong, Junling Guo, Guang Yang, Qi Xie, and Chengliang Tian. "An Efficient and Secure Public Key Authenticated Encryption With Keyword Search in the Logarithmic Time." IEEE Access 9 (2021): 151245–53. http://dx.doi.org/10.1109/access.2021.3126867.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Ma, Yang, and Hassan Kazemian. "A Secure and Efficient Public Key Authenticated Encryption with Multi-keywords Search Scheme against Inside Keyword Guessing Attack." International Journal of Cyber-Security and Digital Forensics 9, no. 2 (2020): 90–101. http://dx.doi.org/10.17781/p002654.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Chenam, Venkata Bhikshapathi, and Syed Taqi Ali. "A designated cloud server-based multi-user certificateless public key authenticated encryption with conjunctive keyword search against IKGA." Computer Standards & Interfaces 81 (April 2022): 103603. http://dx.doi.org/10.1016/j.csi.2021.103603.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Cheng, Leixiao, and Fei Meng. "Security analysis of Pan et al.’s “Public-key authenticated encryption with keyword search achieving both multi-ciphertext and multi-trapdoor indistinguishability”." Journal of Systems Architecture 119 (October 2021): 102248. http://dx.doi.org/10.1016/j.sysarc.2021.102248.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

ZHANG, Rui, and Hideki IMAI. "Combining Public Key Encryption with Keyword Search and Public Key Encryption." IEICE Transactions on Information and Systems E92-D, no. 5 (2009): 888–96. http://dx.doi.org/10.1587/transinf.e92.d.888.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Soroush, A. M. "PUBLIC KEY ENCRYPTION SCHEME BASED ON KEYWORD SEARCH." Open Journal of Physical Science (ISSN: 2734-2123) 4, no. 1 (2023): 34–53. http://dx.doi.org/10.52417/ojps.v4i1.471.

Full text
Abstract:
This study explores the concept of a Public Key Encryption Scheme (PKES) with an emphasis on enabling keyword search functionality. The aim of this research is to develop a cryptographic framework that allows users to securely search over encrypted data without revealing sensitive information. The study investigates various methods and techniques employed in PKES to achieve efficient and privacy-preserving keyword search capabilities. The research highlights the increasing importance of data privacy and the need for secure information retrieval over encrypted data. Traditional encryption metho
APA, Harvard, Vancouver, ISO, and other styles
18

MORGAN, B., M. HAMADA, and G. ABDEFADEL. "EFFICIENT PUBLIC KEY ENCRYPTION WITH KEYWORD SEARCH." JES. Journal of Engineering Sciences 38, no. 3 (2010): 749–61. http://dx.doi.org/10.21608/jesaun.2010.124396.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Yanguo, Peng, Cui Jiangtao, Peng Changgen, and Ying Zuobin. "Certificateless public key encryption with keyword search." China Communications 11, no. 11 (2014): 100–113. http://dx.doi.org/10.1109/cc.2014.7004528.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Saraswat, Vishal, Rajeev Anand Sahu, Gaurav Sharma, Veronika Kuchta, and Olivier Markowitch. "Public-Key Encryption with Integrated Keyword Search." Journal of Hardware and Systems Security 3, no. 1 (2019): 12–25. http://dx.doi.org/10.1007/s41635-019-00066-w.

Full text
APA, Harvard, Vancouver, ISO, and other styles
21

Manoj, Sharma, and Gupta Akshay. "Public Key Encryption and Keyword Search Mapping." Applied Science and Biotechnology Journal for Advanced Research 3, no. 1 (2024): 12–15. https://doi.org/10.5281/zenodo.10656146.

Full text
Abstract:
This work addresses a difficult method for searching for crucial keywords for mixed cloud statistics (MRSE), which is a first step towards enabling secure cloud data processing. Among the different meanings of multiple terms, we choose the relevant concept of "relational coherence". Businesses can now more easily and affordably outsource a greater variety of products and services to community clouds thanks to cloud computing. To guarantee that sensitive personal data is kept enclosed before being supplied for their work. Given the enormous number of users of data and records in a search engine
APA, Harvard, Vancouver, ISO, and other styles
22

ALI, FAIROUZ SHER, and SONG FENG LU. "PUBLIC KEY ENCRYPTION WITH CONJUNCTIVE FIELD FREE KEYWORD SEARCH SCHEME." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 15, no. 14 (2016): 7423–34. http://dx.doi.org/10.24297/ijct.v15i14.834.

Full text
Abstract:
Searchable encryption allows a remote server to search over encrypted documents without knowing the sensitive data contents. Prior searchable symmetric encryption schemes focus on single keyword search. Conjunctive Keyword Searches (CKS) schemes improve system usability by retrieving the matched documents. In this type of search, the user has to repeatedly perform the search protocol for many times. Most of existent (CKS) schemes use conjunctive keyword searches with fixed position keyword fields, this type of search is not useful for many applications, such as unstructured text. In our paper,
APA, Harvard, Vancouver, ISO, and other styles
23

Zhang, Yu, Lei You, and Yin Li. "Tree-Based Public Key Encryption with Conjunctive Keyword Search." Security and Communication Networks 2021 (November 5, 2021): 1–16. http://dx.doi.org/10.1155/2021/7034944.

Full text
Abstract:
Searchable public key encryption supporting conjunctive keyword search is an important technique in today’s cloud environment. Nowadays, previous schemes usually take advantage of forward index structure, which leads to a linear search complexity. In order to obtain better search efficiency, in this paper, we utilize a tree index structure instead of forward index to realize such schemes. To achieve the goal, we first give a set of keyword conversion methods that can convert the index and query keywords into a group of vectors and then present a novel algorithm for building index tree based on
APA, Harvard, Vancouver, ISO, and other styles
24

Zhou, Yunhong, Na Li, Yanmei Tian, Dezhi An, and Licheng Wang. "Public Key Encryption with Keyword Search in Cloud: A Survey." Entropy 22, no. 4 (2020): 421. http://dx.doi.org/10.3390/e22040421.

Full text
Abstract:
With the popularization of cloud computing, many business and individuals prefer to outsource their data to cloud in encrypted form to protect data confidentiality. However, how to search over encrypted data becomes a concern for users. To address this issue, searchable encryption is a novel cryptographic primitive that enables user to search queries over encrypted data stored on an untrusted server while guaranteeing the privacy of the data. Public key encryption with keyword search (PEKS) has received a lot of attention as an important branch. In this paper, we focus on the development of PE
APA, Harvard, Vancouver, ISO, and other styles
25

Yoon, Hyundo, and Junbeom Hur. "SGX-Based Public Key Encryption with Keyword Search." Journal of Korean Institute of Communications and Information Sciences 46, no. 5 (2021): 777–87. http://dx.doi.org/10.7840/kics.2021.46.5.777.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

Liming Fang, Jiandong Wang, Chunpeng Ge, and Yongjun Ren. "Decryptable Public Key Encryption with Keyword Search Schemes." International Journal of Digital Content Technology and its Applications 4, no. 9 (2010): 141–50. http://dx.doi.org/10.4156/jdcta.vol4.issue9.17.

Full text
APA, Harvard, Vancouver, ISO, and other styles
27

Chen, Rongmao, Yi Mu, Guomin Yang, et al. "Server-Aided Public Key Encryption With Keyword Search." IEEE Transactions on Information Forensics and Security 11, no. 12 (2016): 2833–42. http://dx.doi.org/10.1109/tifs.2016.2599293.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

Hu, Chengyu, Pengtao Liu, Rupeng Yang, and Yan Xu. "Public-Key Encryption With Keyword Search via Obfuscation." IEEE Access 7 (2019): 37394–405. http://dx.doi.org/10.1109/access.2019.2905250.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

Yu, Yong, Jianbing Ni, Haomiao Yang, Yi Mu, and Willy Susilo. "Efficient public key encryption with revocable keyword search." Security and Communication Networks 7, no. 2 (2013): 466–72. http://dx.doi.org/10.1002/sec.790.

Full text
APA, Harvard, Vancouver, ISO, and other styles
30

Zhou, Yunhong, Shihui Zheng, and Licheng Wang. "Privacy-Preserving and Efficient Public Key Encryption with Keyword Search Based on CP-ABE in Cloud." Cryptography 4, no. 4 (2020): 28. http://dx.doi.org/10.3390/cryptography4040028.

Full text
Abstract:
In the area of searchable encryption, public key encryption with keyword search (PEKS) has been a critically important and promising technique which provides secure search over encrypted data in cloud computing. PEKS can protect user data privacy without affecting the usage of the data stored in the untrusted cloud server environment. However, most of the existing PEKS schemes concentrate on data users’ rich search functionalities, regardless of their search permission. Attribute-based encryption technology is a good method to solve the security issues, which provides fine-grained access contr
APA, Harvard, Vancouver, ISO, and other styles
31

Yang, Xiaodong, Guilan Chen, Meiding Wang, Ting Li, and Caifen Wang. "Multi-Keyword Certificateless Searchable Public Key Authenticated Encryption Scheme Based on Blockchain." IEEE Access 8 (2020): 158765–77. http://dx.doi.org/10.1109/access.2020.3020841.

Full text
APA, Harvard, Vancouver, ISO, and other styles
32

Mamta, Brij B. Gupta, and Syed Taqi Ali. "ISEkFT." Journal of Information Technology Research 12, no. 3 (2019): 133–53. http://dx.doi.org/10.4018/jitr.2019070108.

Full text
Abstract:
Public-key encryption with keyword search (PEKS) is a well-known technique which allows searching on encrypted data using the public key system. However, this technique suffers from the keyword guessing attack (KGA). To address this problem, a modified version of PEKS called public key encryption with fuzzy keyword search (PEFKS) has been introduced where each keyword is associated with an exact search trapdoor (EST) and a fuzzy search trapdoor (FST) which is provided to the cloud server. PEFKS prevents KGA in such a way that two or maximum three keywords share the same FST. Hence, even if the
APA, Harvard, Vancouver, ISO, and other styles
33

Meng, Xian Yong, Zhong Chen, and Xiang Yu Meng. "A Novel Proxy Re-Encryption with Keyword Search." Applied Mechanics and Materials 631-632 (September 2014): 897–901. http://dx.doi.org/10.4028/www.scientific.net/amm.631-632.897.

Full text
Abstract:
In this paper, a novel proxy re-encryption (PRE) scheme with keyword search is proposed, where only the ciphertext containing the keyword set by the delegator can be transformed by the semi-trusted proxy and then decrypted by delegatee. In the proposed scheme, the semi-trusted proxy can convert the ciphertext encrypted under the delegator’s public key into the ciphertext encrypted under the delegatee’s public key. In addition, only the delegatee’s email gateway with a trapdoor can test whether or not a given cipheretext containing some keyword, but can learn nothing else about the sensitive da
APA, Harvard, Vancouver, ISO, and other styles
34

Zhang, Yu, Yin Li, and Yifan Wang. "Conjunctive and Disjunctive Keyword Search over Encrypted Mobile Cloud Data in Public Key System." Mobile Information Systems 2018 (2018): 1–11. http://dx.doi.org/10.1155/2018/3839254.

Full text
Abstract:
The searchable encryption scheme can perform keywords search operation directly over encrypted data without decryption, which is crucial to cloud storage, and has attracted a lot of attention in these years. However, it is still an open problem to develop an efficient public key encryption scheme supporting conjunctive and a disjunctive keyword search simultaneously. To achieve this goal, we introduce a keyword conversion method that can transform the query and index keywords into a vector space model. Through applying a vector space model to a predicate encryption scheme supporting inner prod
APA, Harvard, Vancouver, ISO, and other styles
35

Zhu, Binrui, Jiameng Sun, Jing Qin, and Jixin Ma. "A Secure Data Sharing Scheme with Designated Server." Security and Communication Networks 2019 (June 27, 2019): 1–16. http://dx.doi.org/10.1155/2019/4268731.

Full text
Abstract:
The cloud-assisted Internet of Things (CIoT) is booming, which utilizes powerful data processing capabilities of the cloud platform to solve massive Internet of Things (IoT) data. However, the CIoT faces new security challenges, such as the confidentiality of the outsourced data. Data encryption is a fundamental technique that can guarantee the confidentiality of outsourced data, but it limits target encrypted data retrieval from cloud platform. Public key encryption with keyword search (PEKS) provides a promising solution to address this problem. In PEKS, a cloud server can be authorized to s
APA, Harvard, Vancouver, ISO, and other styles
36

Yin, Shoulin, Lin Teng, and Jie Liu. "Distributed Searchable Asymmetric Encryption." Indonesian Journal of Electrical Engineering and Computer Science 4, no. 3 (2016): 684. http://dx.doi.org/10.11591/ijeecs.v4.i3.pp684-694.

Full text
Abstract:
<p><em>Searchable asymmetric encryption (SAE) can also be called Public Key Encryption with Keyword Search (PEKS), which allows us to search the keyword on the data of having been encrypted. The essence of Asymmetric searchable encryption is that users exchange the data of encryption, one party sends a ciphertext with key encryption, the other party with another key receives the ciphertext. Encryption key is not the same as the decryption key, and cannot deduce another key from any one of the key, thus it greatly enhances the information protection, and can prevent leakage the user
APA, Harvard, Vancouver, ISO, and other styles
37

Vaanchig, Nyamsuren, and Zhiguang Qin. "Public key encryption with temporary and fuzzy keyword search." Mathematical Biosciences and Engineering 16, no. 5 (2019): 3914–35. http://dx.doi.org/10.3934/mbe.2019193.

Full text
APA, Harvard, Vancouver, ISO, and other styles
38

Wang, Peng, Tao Xiang, Xiaoguo Li, and Hong Xiang. "Public key encryption with conjunctive keyword search on lattice." Journal of Information Security and Applications 51 (April 2020): 102433. http://dx.doi.org/10.1016/j.jisa.2019.102433.

Full text
APA, Harvard, Vancouver, ISO, and other styles
39

Jiang, Zike, and Shixin Chen. "Dual Fine-Grained Public-Key Searchable Encryption from Lattices." Computer and Information Science 15, no. 1 (2022): 66. http://dx.doi.org/10.5539/cis.v15n1p66.

Full text
Abstract:
Fine-grained public key encryption with keyword search (PEKS), allowing users to search on encrypted data with flexible access control policy, has been widely studied recently due to its promising application to real-world scenarios such as cloud computing. However, most of the existing fine-grained PEKS schemes are either only able to support single access control (e.g., attribute-based access control) or susceptible to being attacked or compromised by quantum computers in or after a short time. In this paper, we propose a fine-grained PEKS scheme that o ers dual access control based on latti
APA, Harvard, Vancouver, ISO, and other styles
40

Hwang, Min-Shiang, Cheng-Chi Lee, and Shih-Ting Hsu. "An ElGamal-like Secure Channel Free Public Key Encryption with Keyword Search Scheme." International Journal of Foundations of Computer Science 30, no. 02 (2019): 255–73. http://dx.doi.org/10.1142/s0129054119500047.

Full text
Abstract:
The idea of public key encryption with keyword search (PEKS), proposed by Boneh et al., enables one to send a trapdoor containing a encrypted keyword to query data without revealing the keyword. In Boneh et al.’s design, the trapdoor has to be transferred through a secure channel, which is both costly and inefficient. Baek et al. then proposed an efficient secure channel free public key encryption scheme with keyword search (SCF-PEKS). After that, vast amounts of research have focused on the protection against the off-line keyword guessing attack (OKGA) by enhancing the model. However, most of
APA, Harvard, Vancouver, ISO, and other styles
41

Trinh, Van Anh, and Viet Cuong Trinh. "A CIPHERTEXT-POLICY ATTRIBUTE-BASED SEARCHABLE ENCRYPTION SCHEME IN NON-INTERACTIVE MODEL." Journal of Computer Science and Cybernetics 35, no. 3 (2019): 233–49. http://dx.doi.org/10.15625/1813-9663/0/0/13667.

Full text
Abstract:
We address the problem of searching on encrypted data with expressive searching predicate and multi-writer/multi-reader, a cryptographic primitive which has many concrete application scenarios such as cloud computing, email gateway application and so on. In this paper, we propose a public-key encryption with keyword search scheme relied on the ciphertext-policy attribute-based encryption scheme. In our system, we consider the model where a user can generate trapdoors by himself/herself, we thus can remove the Trusted Trapdoor Generator which can save the resource and communication overhead. We
APA, Harvard, Vancouver, ISO, and other styles
42

Trinh, Van Anh, and Viet Cuong Trinh. "A CIPHERTEXT-POLICY ATTRIBUTE-BASED SEARCHABLE ENCRYPTION SCHEME IN NON-INTERACTIVE MODEL." Journal of Computer Science and Cybernetics 35, no. 3 (2019): 233–49. http://dx.doi.org/10.15625/1813-9663/35/3/13667.

Full text
Abstract:
We address the problem of searching on encrypted data with expressive searching predicate and multi-writer/multi-reader, a cryptographic primitive which has many concrete application scenarios such as cloud computing, email gateway application and so on. In this paper, we propose a public-key encryption with keyword search scheme relied on the ciphertext-policy attribute-based encryption scheme. In our system, we consider the model where a user can generate trapdoors by himself/herself, we thus can remove the Trusted Trapdoor Generator which can save the resource and communication overhead. We
APA, Harvard, Vancouver, ISO, and other styles
43

Ma, Sha, and Qiong Huang. "A New Framework of IND-CCA Secure Public Key Encryption with Keyword Search." Computer Journal 63, no. 12 (2020): 1849–58. http://dx.doi.org/10.1093/comjnl/bxaa014.

Full text
Abstract:
Abstract In the era of cloud computing, public key encryption with keyword search (PEKS) is an extremely useful cryptographic tool for searching on encryption data, whose strongest security notion is indistinguishability encryption against chosen ciphertext attack (ind-cca). Adballa et al. presented a transformation from identity based encryption (IBE) to PEKS in the Theory of Cryptography Conference 2010. This paper proposes a new framework of ind-cca secure PEKS in the standard model. Our main technical tool is a newly introduced notion of smooth projective hash function with key mapping, in
APA, Harvard, Vancouver, ISO, and other styles
44

Noroozi, Mahnaz, Ziba Eslami, and Nasrollah Pakniat. "Comments on a chaos-based public key encryption with keyword search scheme." Nonlinear Dynamics 94, no. 2 (2018): 1127–32. https://doi.org/10.1007/s11071-018-4413-9.

Full text
Abstract:
Recently, Li et al.‎ employed chaotic maps to propose a public key encryption with keyword search scheme.‎ The authors claimed that their scheme provides security against keyword guessing attack (KGA) performed by inside and outside adversaries.‎ The goal of this paper is to show that this claim is not true about inside attackers.‎ We prove that it is possible for an inside adversary to launch an attack even more severe than KGA and obtain the corresponding keyword to any searchable ciphertext.‎ We further propose a simple fix to overcome the proposed attack.‎
APA, Harvard, Vancouver, ISO, and other styles
45

Sher, Fairouz. "Public Key Encryption with ’Fixed and Short Length’ Keyword Search." International Journal of Computer Applications 154, no. 4 (2016): 1–8. http://dx.doi.org/10.5120/ijca2016912086.

Full text
APA, Harvard, Vancouver, ISO, and other styles
46

Lu, Yang, and Ji-guo Li. "Constructing pairing-free certificateless public key encryption with keyword search." Frontiers of Information Technology & Electronic Engineering 20, no. 8 (2019): 1049–60. http://dx.doi.org/10.1631/fitee.1700534.

Full text
APA, Harvard, Vancouver, ISO, and other styles
47

Sook Rhee, Hyun. "Chosen-Ciphertext Attack Secure Public-Key Encryption with Keyword Search." Computers, Materials & Continua 73, no. 1 (2022): 69–85. http://dx.doi.org/10.32604/cmc.2022.026751.

Full text
APA, Harvard, Vancouver, ISO, and other styles
48

Wu, Tsu-Yang, Chien-Ming Chen, King-Hang Wang, Chao Meng, and Eric Ke Wang. "A provably secure certificateless public key encryption with keyword search." Journal of the Chinese Institute of Engineers 42, no. 1 (2019): 20–28. http://dx.doi.org/10.1080/02533839.2018.1537807.

Full text
APA, Harvard, Vancouver, ISO, and other styles
49

Chen, Zhenwei, Axin Wu, Yifei Li, Qixuan Xing, and Shengling Geng. "Blockchain-Enabled Public Key Encryption with Multi-Keyword Search in Cloud Computing." Security and Communication Networks 2021 (January 20, 2021): 1–11. http://dx.doi.org/10.1155/2021/6619689.

Full text
Abstract:
The emergence of the cloud storage has brought great convenience to people’s life. Many individuals and enterprises have delivered a large amount of data to the third-party server for storage. Thus, the privacy protection of data retrieved by the user needs to be guaranteed. Searchable encryption technology for the cloud environment is adopted to ensure that the user information is secure with retrieving data. However, most schemes only support single-keyword search and do not support file updates, which limit the flexibility of the scheme. To eliminate these problems, we propose a blockchain-
APA, Harvard, Vancouver, ISO, and other styles
50

Zhang, Yu, Wei He, and Yin Li. "Efficient Boolean Keywords Search over Encrypted Cloud Data in Public Key Setting." Mobile Information Systems 2020 (August 26, 2020): 1–15. http://dx.doi.org/10.1155/2020/2904861.

Full text
Abstract:
Searchable public key encryption- (SPE-) supporting keyword search plays an important role in cloud computing for data confidentiality. The current SPE scheme mainly supports conjunctive or disjunctive keywords search which belongs to very basic query operations. In this paper, we propose an efficient and secure SPE scheme that supports Boolean keywords search, which is more advanced than the conjunctive and disjunctive keywords search. We first develop a keyword conversion method, which can change the index and Boolean keywords query into a group of vectors. Then, through applying a technique
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!