• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 21
Next 10 →

Integrated PKE and PEKS- Stronger Security Notions and New Constructions

by Yu Chen, Jiang Zhang, Zhenfeng Zhang, Dongdai Lin
"... Abstract. In this paper we investigate the security for integrated public-key encryption (PKE) and public-key encryption with keyword search (PEKS) schemes. We observe that the security notions for integrated PKE and PEKS schemes considered in the existing literature are not strong enough to capture ..."
Abstract - Add to MetaCart
Abstract. In this paper we investigate the security for integrated public-key encryption (PKE) and public-key encryption with keyword search (PEKS) schemes. We observe that the security notions for integrated PKE and PEKS schemes considered in the existing literature are not strong enough

An Investigation of Some Forward Security Properties for PEKS and IBE

by Qiang Tang
"... Abstract. In cryptography, forward secrecy is a well-known property of key agreement protocols. It ensures that a session key remains secure even if one of the long-term secret keys is compromised in the future. In this paper, we investigate some forward security properties for Public-key Encryption ..."
Abstract - Add to MetaCart
-key Encryption with Keyword Search (PEKS) schemes, which allow a client to store encrypted data and delegate search operations to a server. The proposed properties guarantee that the client’s privacy is protected to the maximum extent when his private key is compromised. Motivated by the generic transformation

A study of public key encryption with keyword search,”

by Shih-Ting Hsu , Chou-Chen Yang , Min-Shiang Hwang , Min-Shiang Hwang - International Journal of Network Security, , 2013
"... Abstract Public Key Encryption with Keyword Search (PEKS) scheme enable one to search the encrypted data with a keyword without revealing any information. The concept of a PEKS scheme was proposed by ..."
Abstract - Cited by 1 (0 self) - Add to MetaCart
Abstract Public Key Encryption with Keyword Search (PEKS) scheme enable one to search the encrypted data with a keyword without revealing any information. The concept of a PEKS scheme was proposed by

Searchable encryption revisited: Consistency properties, relation to anonymous IBE, and extensions

by Michel Abdalla, Mihir Bellare, Dario Catalano, Eike Kiltz, Tadayoshi Kohno, Tanja Lange, John Malone-lee, Gregory Neven, Pascal Paillier, Haixia Shi , 2005
"... We identify and fill some gaps with regard to consistency (the extent to which false positives are produced) for public-key encryption with keyword search (PEKS). We define computational and statistical relaxations of the existing notion of perfect consistency, show that the scheme of [7] is compu ..."
Abstract - Cited by 143 (3 self) - Add to MetaCart
We identify and fill some gaps with regard to consistency (the extent to which false positives are produced) for public-key encryption with keyword search (PEKS). We define computational and statistical relaxations of the existing notion of perfect consistency, show that the scheme of [7

New efficient searchable encryption schemes from bilinear pairings

by Chunxiang Gu, Yuefei Zhu - International Journal of Network Security , 2010
"... Public key encryption with keyword search (PEKS) enables user Alice to send a secret key TW to a server that will enable the server to locate all encrypted messages containing the keyword W, but learn nothing else. In this paper, we propose a new PEKS scheme based on bilinear pairings. There is no p ..."
Abstract - Cited by 5 (0 self) - Add to MetaCart
Public key encryption with keyword search (PEKS) enables user Alice to send a secret key TW to a server that will enable the server to locate all encrypted messages containing the keyword W, but learn nothing else. In this paper, we propose a new PEKS scheme based on bilinear pairings

Public Key Encryption with Keyword Search Revisited

by Joonsang Baek, Reihaneh Safiavi-naini, Willy Susilo , 2005
"... The public key encryption with keyword search (PEKS) scheme recently proposed by Boneh, Di Crescenzo, Ostrovsky, and Persiano enables one to search encrypted keywords without compromising the security of the original data. In this paper, we address three important issues of a PEKS scheme, "r ..."
Abstract - Cited by 43 (2 self) - Add to MetaCart
The public key encryption with keyword search (PEKS) scheme recently proposed by Boneh, Di Crescenzo, Ostrovsky, and Persiano enables one to search encrypted keywords without compromising the security of the original data. In this paper, we address three important issues of a PEKS scheme, "

Public key encryption with keyword search secure against keyword guessing attacks without random oracle

by Liming Fang, Jiandong Wang, Chunpeng Ge, Yongjun Ren - Information Sciences
"... doi:10.4156/jdcta.vol4. issue9.17 A public key encryption with keyword search (PEKS) scheme does not allow the user to decrypt the encrypted keyword or decrypt the encrypted massage. This "no-decryption " property also limits the applicability of a PEKS scheme. Fuhr and Paillier also left ..."
Abstract - Cited by 6 (0 self) - Add to MetaCart
doi:10.4156/jdcta.vol4. issue9.17 A public key encryption with keyword search (PEKS) scheme does not allow the user to decrypt the encrypted keyword or decrypt the encrypted massage. This "no-decryption " property also limits the applicability of a PEKS scheme. Fuhr and Paillier also left

Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions

by Michel Abdalla École Normale Supérieure, Dario Catalano École Normale Supérieure, Gregory Neven, Pascal Paillier, Gemplus Card International , 2005
"... We identify and fill some gaps with regard to consistency (the extent to which false positives are produced) for public-key encryption with keyword search (PEKS). We define computational and statistical relaxations of the existing notion of perfect consistency, show that the scheme of [7] is computa ..."
Abstract - Cited by 1 (0 self) - Add to MetaCart
We identify and fill some gaps with regard to consistency (the extent to which false positives are produced) for public-key encryption with keyword search (PEKS). We define computational and statistical relaxations of the existing notion of perfect consistency, show that the scheme of [7

Anonymous Hierarchical Identity-Based Encryption (Without Random Oracles). In: Dwork

by Xavier Boyen , Brent Waters - CRYPTO 2006. LNCS, , 2006
"... Abstract We present an identity-based cryptosystem that features fully anonymous ciphertexts and hierarchical key delegation. We give a proof of security in the standard model, based on the mild Decision Linear complexity assumption in bilinear groups. The system is efficient and practical, with sm ..."
Abstract - Cited by 119 (10 self) - Add to MetaCart
been interest in "anonymous" identity-based encryption systems, where the ciphertext does not leak the identity of the recipient. In addition to their obvious privacy benefits, anonymous IBE systems can be leveraged to construct Public key Encryption with Keyword Search (PEKS) schemes

Public-Key Encryption with Fuzzy Keyword Search: A Provably Secure Scheme under Keyword Guessing Attack

by Peng Xu, Hai Jin , 2010
"... A lot of interest has been drawn recently into public-key encryption with keyword search (PEKS), which keeps publickey encrypted documents amendable to secure keyword search. However, PEKS resist against keyword guessing attack by assuming that the size of the keyword space is beyond the polynomial ..."
Abstract - Cited by 6 (0 self) - Add to MetaCart
A lot of interest has been drawn recently into public-key encryption with keyword search (PEKS), which keeps publickey encrypted documents amendable to secure keyword search. However, PEKS resist against keyword guessing attack by assuming that the size of the keyword space is beyond
Next 10 →
Results 1 - 10 of 21
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University