Results 1 - 10
of
121
An ElGamal Encryption with Fuzzy Keyword Search on Cloud Environment
"... Abstract With the continuous development of cloud computing, more and more sensitive data needs to be centrally stored in the cloud storage. For protecting the privacy of data, sensitive data must be encrypted before being outsourced to the server. The traditional PEKS (Public Encryption Keyword Se ..."
Abstract
- Add to MetaCart
Search) enables users to search data by using keywords in the condition of encryption, however, it not only needs the security channel but also tolerates the huge pairing-computation. Although the pairing-free public key encryption with keyword search has been proposed, it can not support fuzzy keyword
Efficient Public Key Encryption with Keyword Search Schemes from Pairings
, 2006
"... Public key encryption with keyword search (PEKS) enables user Alice to send a secret key T_W to a server that will enable the server to locate all encrypted messages containing the keyword W, but learn nothing else. In this paper, we propose a new PKES scheme based on pairings. There is no pairing o ..."
Abstract
-
Cited by 5 (0 self)
- Add to MetaCart
Public key encryption with keyword search (PEKS) enables user Alice to send a secret key T_W to a server that will enable the server to locate all encrypted messages containing the keyword W, but learn nothing else. In this paper, we propose a new PKES scheme based on pairings. There is no pairing
Public Key Encryption with Keyword Search Revisited
, 2005
"... The public key encryption with keyword search (PEKS) scheme recently proposed by Boneh, Di Crescenzo, Ostrovsky, and Persiano enables one to search encrypted keywords without compromising the security of the original data. In this paper, we address three important issues of a PEKS scheme, "r ..."
Abstract
-
Cited by 43 (2 self)
- Add to MetaCart
The public key encryption with keyword search (PEKS) scheme recently proposed by Boneh, Di Crescenzo, Ostrovsky, and Persiano enables one to search encrypted keywords without compromising the security of the original data. In this paper, we address three important issues of a PEKS scheme, "
A new trapdoorindistinguishable public key encryption with keyword search
- Journal of Wireless Mobile Networks, Ubiquitous Computing and Dependable Applications
, 2012
"... Abstract The public key encryption with keyword search (PEKS) provides a way for users to search data which are encrypted under the users' public key on a storage system. However, the original schemes are based on the unrealistic assumption of a secure channel between the receiver and the serv ..."
Abstract
-
Cited by 3 (0 self)
- Add to MetaCart
Abstract The public key encryption with keyword search (PEKS) provides a way for users to search data which are encrypted under the users' public key on a storage system. However, the original schemes are based on the unrealistic assumption of a secure channel between the receiver
Generic Combination of Public Key Encryption with Keyword Search and Public Key Encryption
"... Abstract. In this paper, we study the problem of secure integrating public key encryption with keyword search (PEKS) with public key data encryption (PKE). We argue the previous security model is not complete regarding keyword privacy and the previous constructions are secure only in the random orac ..."
Abstract
-
Cited by 14 (0 self)
- Add to MetaCart
Abstract. In this paper, we study the problem of secure integrating public key encryption with keyword search (PEKS) with public key data encryption (PKE). We argue the previous security model is not complete regarding keyword privacy and the previous constructions are secure only in the random
Public-Key Encryption with Fuzzy Keyword Search: A Provably Secure Scheme under Keyword Guessing Attack
, 2010
"... A lot of interest has been drawn recently into public-key encryption with keyword search (PEKS), which keeps publickey encrypted documents amendable to secure keyword search. However, PEKS resist against keyword guessing attack by assuming that the size of the keyword space is beyond the polynomial ..."
Abstract
-
Cited by 6 (0 self)
- Add to MetaCart
A lot of interest has been drawn recently into public-key encryption with keyword search (PEKS), which keeps publickey encrypted documents amendable to secure keyword search. However, PEKS resist against keyword guessing attack by assuming that the size of the keyword space is beyond
Leakage Resilient ElGamal Encryption
"... Abstract. Blinding is a popular and well-known countermeasure to protect public-key cryptosystems against side-channel attacks. The high level idea is to randomize an exponentiation in order to prevent multiple measurements of the same operation on different data, as such measurements might allow th ..."
Abstract
-
Cited by 20 (0 self)
- Add to MetaCart
. In particular, we consider a multiplicatively blinded version of ElGamal public-key encryption where – we prove that the scheme, instantiated over bilinear groups of prime order p (where p−1 is not smooth) is leakage resilient in the genericgroup model. Here we consider the model of chosen-ciphertext security
Searching Keywords with Wildcards on Encrypted Data
"... Abstract. A hidden vector encryption scheme (HVE) is a derivation of identity-based encryption, where the public key is actually a vector over a certain alphabet. The decryption key is also derived from such a vector, but this one is also allowed to have “⋆ ” (or wildcard) entries. Decryption is pos ..."
Abstract
-
Cited by 4 (0 self)
- Add to MetaCart
Abstract. A hidden vector encryption scheme (HVE) is a derivation of identity-based encryption, where the public key is actually a vector over a certain alphabet. The decryption key is also derived from such a vector, but this one is also allowed to have “⋆ ” (or wildcard) entries. Decryption
Public key encryption with keyword search secure against keyword guessing attacks without random oracle
- Information Sciences
"... doi:10.4156/jdcta.vol4. issue9.17 A public key encryption with keyword search (PEKS) scheme does not allow the user to decrypt the encrypted keyword or decrypt the encrypted massage. This "no-decryption " property also limits the applicability of a PEKS scheme. Fuhr and Paillier also left ..."
Abstract
-
Cited by 6 (0 self)
- Add to MetaCart
doi:10.4156/jdcta.vol4. issue9.17 A public key encryption with keyword search (PEKS) scheme does not allow the user to decrypt the encrypted keyword or decrypt the encrypted massage. This "no-decryption " property also limits the applicability of a PEKS scheme. Fuhr and Paillier also left
Searchable Keyword-Based Encryption
, 2005
"... To solve the problem of searching on encrypted data, many keyword search schemes have been proposed in recent years. The goal of such schemes is to enable a user to give an untrusted storage server the ability only to test whether an encrypted document contains a few keywords without learning anyt ..."
Abstract
-
Cited by 1 (0 self)
- Add to MetaCart
#cient construction whose security is proved in a random oracle model under the Bilinear Di#e-Hellman Inversion assumption. The scheme is constructed based on the Public Key Encryption with Conjunctive Field Keyword Search scheme in [21] by using a hybrid encryption technique.
Results 1 - 10
of
121