Results 1 - 10
of
1,901
A study of public key encryption with keyword search,”
- International Journal of Network Security,
, 2013
"... Abstract Public Key Encryption with Keyword Search (PEKS) scheme enable one to search the encrypted data with a keyword without revealing any information. The concept of a PEKS scheme was proposed by ..."
Abstract
-
Cited by 1 (0 self)
- Add to MetaCart
Abstract Public Key Encryption with Keyword Search (PEKS) scheme enable one to search the encrypted data with a keyword without revealing any information. The concept of a PEKS scheme was proposed by
Generic Combination of Public Key Encryption with Keyword Search and Public Key Encryption
"... Abstract. In this paper, we study the problem of secure integrating public key encryption with keyword search (PEKS) with public key data encryption (PKE). We argue the previous security model is not complete regarding keyword privacy and the previous constructions are secure only in the random orac ..."
Abstract
-
Cited by 14 (0 self)
- Add to MetaCart
Abstract. In this paper, we study the problem of secure integrating public key encryption with keyword search (PEKS) with public key data encryption (PKE). We argue the previous security model is not complete regarding keyword privacy and the previous constructions are secure only in the random
Public Key Encryption with Keyword Search Revisited
, 2005
"... The public key encryption with keyword search (PEKS) scheme recently proposed by Boneh, Di Crescenzo, Ostrovsky, and Persiano enables one to search encrypted keywords without compromising the security of the original data. In this paper, we address three important issues of a PEKS scheme, "r ..."
Abstract
-
Cited by 43 (2 self)
- Add to MetaCart
The public key encryption with keyword search (PEKS) scheme recently proposed by Boneh, Di Crescenzo, Ostrovsky, and Persiano enables one to search encrypted keywords without compromising the security of the original data. In this paper, we address three important issues of a PEKS scheme, "
On The Limits of Steganography
- IEEE Journal of Selected Areas in Communications
, 1998
"... In this paper, we clarify what steganography is and what it can do. We contrast it with the related disciplines of cryptography and tra#c security, present a unified terminology agreed at the first international workshop on the subject, and outline a number of approaches---many of them developed to ..."
Abstract
-
Cited by 413 (2 self)
- Add to MetaCart
that Shannon gave us a general theory of secrecy systems). However, theoretical considerations lead to ideas of practical value, such as the use of parity checks to amplify covertness and provide public key steganography. Finally, we show that public key information hiding systems exist
Searching Keywords with Wildcards on Encrypted Data
"... Abstract. A hidden vector encryption scheme (HVE) is a derivation of identity-based encryption, where the public key is actually a vector over a certain alphabet. The decryption key is also derived from such a vector, but this one is also allowed to have “⋆ ” (or wildcard) entries. Decryption is pos ..."
Abstract
-
Cited by 4 (0 self)
- Add to MetaCart
Abstract. A hidden vector encryption scheme (HVE) is a derivation of identity-based encryption, where the public key is actually a vector over a certain alphabet. The decryption key is also derived from such a vector, but this one is also allowed to have “⋆ ” (or wildcard) entries. Decryption
Secure Conjunctive Keyword Search over Encrypted Data
- ACNS 04: 2nd International Conference on Applied Cryptography and Network Security
, 2004
"... We study the setting in which a user stores encrypted documents (e.g. e-mails) on an untrusted server. In order to retrieve documents satisfying a certain search criterion, the user gives the server a capability that allows the server to identify exactly those documents. ..."
Abstract
-
Cited by 105 (1 self)
- Add to MetaCart
We study the setting in which a user stores encrypted documents (e.g. e-mails) on an untrusted server. In order to retrieve documents satisfying a certain search criterion, the user gives the server a capability that allows the server to identify exactly those documents.
A new trapdoorindistinguishable public key encryption with keyword search
- Journal of Wireless Mobile Networks, Ubiquitous Computing and Dependable Applications
, 2012
"... Abstract The public key encryption with keyword search (PEKS) provides a way for users to search data which are encrypted under the users' public key on a storage system. However, the original schemes are based on the unrealistic assumption of a secure channel between the receiver and the serv ..."
Abstract
-
Cited by 3 (0 self)
- Add to MetaCart
Abstract The public key encryption with keyword search (PEKS) provides a way for users to search data which are encrypted under the users' public key on a storage system. However, the original schemes are based on the unrealistic assumption of a secure channel between the receiver
Efficient Public Key Encryption with Keyword Search Schemes from Pairings
, 2006
"... Public key encryption with keyword search (PEKS) enables user Alice to send a secret key T_W to a server that will enable the server to locate all encrypted messages containing the keyword W, but learn nothing else. In this paper, we propose a new PKES scheme based on pairings. There is no pairing o ..."
Abstract
-
Cited by 5 (0 self)
- Add to MetaCart
Public key encryption with keyword search (PEKS) enables user Alice to send a secret key T_W to a server that will enable the server to locate all encrypted messages containing the keyword W, but learn nothing else. In this paper, we propose a new PKES scheme based on pairings. There is no pairing
PEKSrand: Providing Predicate Privacy in Public-key Encryption with Keyword Search
"... notion of predicate privacy, i.e., the property that t(x) reveals no information about the encoded predicate p, and proposed a scheme that achieves predicate privacy in the symmetric-key settings. In this paper, we propose two schemes. In the first scheme, we extend PEKS to support predicate privacy ..."
Abstract
-
Cited by 5 (0 self)
- Add to MetaCart
notion of predicate privacy, i.e., the property that t(x) reveals no information about the encoded predicate p, and proposed a scheme that achieves predicate privacy in the symmetric-key settings. In this paper, we propose two schemes. In the first scheme, we extend PEKS to support predicate
Results 1 - 10
of
1,901