• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 1,901
Next 10 →

A study of public key encryption with keyword search,”

by Shih-Ting Hsu , Chou-Chen Yang , Min-Shiang Hwang , Min-Shiang Hwang - International Journal of Network Security, , 2013
"... Abstract Public Key Encryption with Keyword Search (PEKS) scheme enable one to search the encrypted data with a keyword without revealing any information. The concept of a PEKS scheme was proposed by ..."
Abstract - Cited by 1 (0 self) - Add to MetaCart
Abstract Public Key Encryption with Keyword Search (PEKS) scheme enable one to search the encrypted data with a keyword without revealing any information. The concept of a PEKS scheme was proposed by

Public Key Encryption with Keyword Search

by Dan Boneh, Giovanni Di Crescenzo , Rafail Ostrovsky , Giuseppe Persiano
"... ..."
Abstract - Cited by 383 (12 self) - Add to MetaCart
Abstract not found

Generic Combination of Public Key Encryption with Keyword Search and Public Key Encryption

by Rui Zhang, Hideki Imai
"... Abstract. In this paper, we study the problem of secure integrating public key encryption with keyword search (PEKS) with public key data encryption (PKE). We argue the previous security model is not complete regarding keyword privacy and the previous constructions are secure only in the random orac ..."
Abstract - Cited by 14 (0 self) - Add to MetaCart
Abstract. In this paper, we study the problem of secure integrating public key encryption with keyword search (PEKS) with public key data encryption (PKE). We argue the previous security model is not complete regarding keyword privacy and the previous constructions are secure only in the random

Public Key Encryption with Keyword Search Revisited

by Joonsang Baek, Reihaneh Safiavi-naini, Willy Susilo , 2005
"... The public key encryption with keyword search (PEKS) scheme recently proposed by Boneh, Di Crescenzo, Ostrovsky, and Persiano enables one to search encrypted keywords without compromising the security of the original data. In this paper, we address three important issues of a PEKS scheme, "r ..."
Abstract - Cited by 43 (2 self) - Add to MetaCart
The public key encryption with keyword search (PEKS) scheme recently proposed by Boneh, Di Crescenzo, Ostrovsky, and Persiano enables one to search encrypted keywords without compromising the security of the original data. In this paper, we address three important issues of a PEKS scheme, "

On The Limits of Steganography

by Ross Anderson, Fabien Petitcolas - IEEE Journal of Selected Areas in Communications , 1998
"... In this paper, we clarify what steganography is and what it can do. We contrast it with the related disciplines of cryptography and tra#c security, present a unified terminology agreed at the first international workshop on the subject, and outline a number of approaches---many of them developed to ..."
Abstract - Cited by 413 (2 self) - Add to MetaCart
that Shannon gave us a general theory of secrecy systems). However, theoretical considerations lead to ideas of practical value, such as the use of parity checks to amplify covertness and provide public key steganography. Finally, we show that public key information hiding systems exist

Searching Keywords with Wildcards on Encrypted Data

by Saeed Sedghi, Peter Van Liesdonk, Svetla Nikova, Pieter Hartel, Willem Jonker
"... Abstract. A hidden vector encryption scheme (HVE) is a derivation of identity-based encryption, where the public key is actually a vector over a certain alphabet. The decryption key is also derived from such a vector, but this one is also allowed to have “⋆ ” (or wildcard) entries. Decryption is pos ..."
Abstract - Cited by 4 (0 self) - Add to MetaCart
Abstract. A hidden vector encryption scheme (HVE) is a derivation of identity-based encryption, where the public key is actually a vector over a certain alphabet. The decryption key is also derived from such a vector, but this one is also allowed to have “⋆ ” (or wildcard) entries. Decryption

Secure Conjunctive Keyword Search over Encrypted Data

by Philippe Golle, Jessica Staddon, Brent Waters - ACNS 04: 2nd International Conference on Applied Cryptography and Network Security , 2004
"... We study the setting in which a user stores encrypted documents (e.g. e-mails) on an untrusted server. In order to retrieve documents satisfying a certain search criterion, the user gives the server a capability that allows the server to identify exactly those documents. ..."
Abstract - Cited by 105 (1 self) - Add to MetaCart
We study the setting in which a user stores encrypted documents (e.g. e-mails) on an untrusted server. In order to retrieve documents satisfying a certain search criterion, the user gives the server a capability that allows the server to identify exactly those documents.

A new trapdoorindistinguishable public key encryption with keyword search

by Yuanjie Zhao , Xiaofeng Chen , Hua Ma , Qiang Tang , Hui Zhu - Journal of Wireless Mobile Networks, Ubiquitous Computing and Dependable Applications , 2012
"... Abstract The public key encryption with keyword search (PEKS) provides a way for users to search data which are encrypted under the users' public key on a storage system. However, the original schemes are based on the unrealistic assumption of a secure channel between the receiver and the serv ..."
Abstract - Cited by 3 (0 self) - Add to MetaCart
Abstract The public key encryption with keyword search (PEKS) provides a way for users to search data which are encrypted under the users' public key on a storage system. However, the original schemes are based on the unrealistic assumption of a secure channel between the receiver

Efficient Public Key Encryption with Keyword Search Schemes from Pairings

by Chunxiang Gu, Yuefei Zhu, Yajuan Zhang , 2006
"... Public key encryption with keyword search (PEKS) enables user Alice to send a secret key T_W to a server that will enable the server to locate all encrypted messages containing the keyword W, but learn nothing else. In this paper, we propose a new PKES scheme based on pairings. There is no pairing o ..."
Abstract - Cited by 5 (0 self) - Add to MetaCart
Public key encryption with keyword search (PEKS) enables user Alice to send a secret key T_W to a server that will enable the server to locate all encrypted messages containing the keyword W, but learn nothing else. In this paper, we propose a new PKES scheme based on pairings. There is no pairing

PEKSrand: Providing Predicate Privacy in Public-key Encryption with Keyword Search

by Benwen Zhu, Kui Ren, Waters Introduced The
"... notion of predicate privacy, i.e., the property that t(x) reveals no information about the encoded predicate p, and proposed a scheme that achieves predicate privacy in the symmetric-key settings. In this paper, we propose two schemes. In the first scheme, we extend PEKS to support predicate privacy ..."
Abstract - Cited by 5 (0 self) - Add to MetaCart
notion of predicate privacy, i.e., the property that t(x) reveals no information about the encoded predicate p, and proposed a scheme that achieves predicate privacy in the symmetric-key settings. In this paper, we propose two schemes. In the first scheme, we extend PEKS to support predicate
Next 10 →
Results 1 - 10 of 1,901
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University