Filters








1,473 Hits in 6.0 sec

A New Public Key Encryption with Conjunctive Field Keyword Search Scheme

M. -S. Hwang, S. -T. Hsu, C. -C. Lee
2014 Information Technology and Control  
In this paper, we propose an efficient secure channel free public key encryption with conjunctive field keyword search scheme that can stand against the off-line keyword-guessing attacks, which is more  ...  ., and then Park et al. extended their scheme into a public key system.  ...  [21] presented a new scheme based on a public key cryptosystem, which is named Public key Encryption with Conjunctive fields Keyword Search (PECKS) scheme.  ... 
doi:10.5755/j01.itc.43.3.6429 fatcat:ztdxhc2mlrggriut5yy36idwey

PUBLIC KEY ENCRYPTION WITH CONJUNCTIVE FIELD FREE KEYWORD SEARCH SCHEME

FAIROUZ SHER ALI, SONG FENG LU
2016 INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY  
In our paper, we propose a new public key encryption scheme based on bilinear pairings, the scheme supports conjunctive keyword search queries on encrypted data without needing to specify the positions  ...  Most of existent (CKS) schemes use conjunctive keyword searches with fixed position keyword fields, this type of search is not useful for many applications, such as unstructured text.  ...  Hwang and Lee [12] introduced a public key encryption scheme with conjunctive keyword search (PECK) and gave a new concept called multiuser PECKS.  ... 
doi:10.24297/ijct.v15i14.834 fatcat:2zkbg5fmnzealbmyxaf6r52pwy

A Survey of Provably Secure Searchable Encryption

Christoph Bösch, Pieter Hartel, Willem Jonker, Andreas Peter
2014 ACM Computing Surveys  
The first M/S scheme is due to Boneh et al. [2004b] , who proposed a public key encryption with keyword search (PEKS) scheme. Meanwhile, PEKS is also used as a name for the class of M/S schemes.  ...  with keyword search (PEKS).  ...  Park et al. [2004] (PKL) study the problem of public key encryption with conjunctive field keyword search (PECKS).  ... 
doi:10.1145/2636328 fatcat:3ho3qfcufjhopgigvlvh7qwkem

On Security of a Secure Channel Free Public Key Encryption with Conjunctive Field Keyword Search Scheme

Yang Lu, Gang Wang, Jiguo Li
2018 Information Technology and Control  
Recently, Hwang et al. proposed a secure channel free public key encryption with conjunctive field keyword search (SCF-PECKS) scheme and claimed that their scheme can withstand the keyword guessing attack  ...  Therefore, devising a secure SCF-PECKS scheme remains an unsolved problem until now. KEYWORDS: public key encryption, conjunctive field keyword search, secure channel free, keyword guessing attack.  ...  To provide multi-keyword search, Park et al. [23] first proposed a public key encryption with conjunctive field keyword search (PECKS) scheme. Subsequently, several PECKS schemes were proposed, e.g.  ... 
doi:10.5755/j01.itc.47.1.16137 fatcat:kwwncghr2vgt7emjnf47277gha

Public Key Encryption with Keyword Search in Cloud: A Survey

Yunhong Zhou, Na Li, Yanmei Tian, Dezhi An, Licheng Wang
2020 Entropy  
Public key encryption with keyword search (PEKS) has received a lot of attention as an important branch.  ...  From a technological viewpoint, the existing PEKS schemes can be classified into several variants: PEKS based on public key infrastructure, PEKS based on identity-based encryption, PEKS based on attribute-based  ...  [28] schemes and proposed a new concept called multiuser public key encryption with conjunctive keyword search to save the communication and storage space. Subsequently, Zhang et al.  ... 
doi:10.3390/e22040421 pmid:33286195 pmcid:PMC7516898 fatcat:qovvzpdonnbd5bswb7j7q5igiq

A Comparative Study of Homomorphic and Searchable Encryption Schemes for Cloud Computing [article]

B.T. Prasanna, C.B. Akki
2015 arXiv   pre-print
This paper focuses on Searchable and Homomorphic Encryption methods. Finally, a comparative study of these two efficient cloud cryptographic methods has been carried out and given here.  ...  Cloud computing is a popular distributed network and utility model based technology.  ...  In public key scheme different keys are used for encryption and keyword search.  ... 
arXiv:1505.03263v1 fatcat:6lugnvheqnepfecz2j6mbjqoyu

Secure and Efficient Conjunctive Keyword Search Scheme without Secure Channel

2019 KSII Transactions on Internet and Information Systems  
To solve this problem, an efficient conjunctive keyword search scheme based on ciphertext-policy attribute-based encryption is proposed for cloud storage environment.  ...  Conjunctive keyword search encryption is an important technique for protecting sensitive data that is outsourced to cloud servers.  ...  [5] proposed a conjunctive field keyword search scheme, which assumed that n keyword fields are associated with each document. Zhang et al.  ... 
doi:10.3837/tiis.2019.05.026 fatcat:oqbyc5upkzfn3c7zive4svgzdi

Secure and Efficient Searchable Public Key Encryption for Resource Constrained Environment Based on Pairings under Prime Order Group

Yu Zhang, Yin Li, Yifan Wang
2019 Security and Communication Networks  
Specifically, public key encryption with conjunctive and disjunctive keyword search (PECDK) can provide flexible search options without sacrificing keywords security and thus attracts a lot of attention  ...  Searchable public key encryption scheme is a key technique for protecting data confidentiality in today's cloud environment.  ...  Acknowledgments We gratefully acknowledge the support of the National Natural Science Foundation of China under Grant Nos. 61402393 and 61601396 and Shanghai Key Laboratory of Integrated Administration  ... 
doi:10.1155/2019/5280806 fatcat:5iihg23vorfalp32p73r6reygy

Secure Conjunctive Keyword Search over Encrypted Data [chapter]

Philippe Golle, Jessica Staddon, Brent Waters
2004 Lecture Notes in Computer Science  
We define a security model for conjunctive keyword search over encrypted data and present the first schemes for conducting such searches securely.  ...  We propose a second scheme whose communication cost is on the order of the number of keyword fields and whose security relies on a new hardness assumption.  ...  The first public key schemes for keyword search over encrypted data are presented in [3] .  ... 
doi:10.1007/978-3-540-24852-1_3 fatcat:lhsyv24s2zfdzgpgfxgarfjrxy

Tree-Based Public Key Encryption with Conjunctive Keyword Search

Yu Zhang, Lei You, Yin Li, Hu Xiong
2021 Security and Communication Networks  
Finally, by combining an efficient predicate encryption scheme to encrypt the index tree, a tree-based public key encryption with conjunctive keyword search scheme is proposed.  ...  Searchable public key encryption supporting conjunctive keyword search is an important technique in today's cloud environment.  ...  To support conjunctive keywords search, Park et al. gave two public key encryptions with conjunctive keyword search (PECK) schemes [3] . e first scheme requires too much bilinear pairing operations, while  ... 
doi:10.1155/2021/7034944 fatcat:xjlzdsdgfzh2zlfioyhndy3kfe

Expressive search on encrypted data

Junzuo Lai, Xuhua Zhou, Robert Huijie Deng, Yingjiu Li, Kefei Chen
2013 Proceedings of the 8th ACM SIGSAC symposium on Information, computer and communications security - ASIA CCS '13  
Different from the traditional public key encryption, searchable public key encryption allows a data owner to encrypt his data under a user's public key in such a way that the user can generate search  ...  In this paper, based on the key-policy attribute-based encryption scheme proposed by Lewko et al. recently, we present a new construction of searchable public key encryption.  ...  Except stated explicitly, ciphertexts of a public key encryption with keyword search scheme consist of only the keyword encryptions.  ... 
doi:10.1145/2484313.2484345 dblp:conf/ccs/LaiZDLC13 fatcat:my3r2fxtofdgnbapcvtcqn63dy

Searchable Public Key Encryption Supporting Simple Boolean Keywords Search

Yu ZHANG, Yansong ZHAO, Yifan WANG, Yin LI
2020 IEICE Transactions on Fundamentals of Electronics Communications and Computer Sciences  
Based on a combination of these obtained vectors and an adaptively secure inner product encryption scheme, a public key encryption with simple Boolean keyword search scheme is proposed.  ...  In this paper, we make a progress for constructing a searchable public key encryption scheme with advanced query function called simple Boolean keyword search.  ...  Acknowledgments This work was supported by the National Natural Science Foundation of China (Grant No. 61402393, 61601396), by Shanghai Key Laboratory of Integrated Administration Technologies for Information  ... 
doi:10.1587/transfun.2019cip0006 fatcat:pra6kwcqojaupinnczxyyjzriu

Expressive and Secure Searchable Encryption in the Public Key Setting [chapter]

Zhiquan Lv, Cheng Hong, Min Zhang, Dengguo Feng
2014 Lecture Notes in Computer Science  
Traditional searchable encryption schemes focus only on single keyword or conjunctive keyword search.  ...  Several solutions have been recently proposed to design more expressive search criteria, but most of them are in the setting of symmetric key encryption.  ...  In this paper, we present a new scheme ESASE, to solve the problem of expressive search in the public key setting.  ... 
doi:10.1007/978-3-319-13257-0_21 fatcat:xmwsabyqzvepfhrhxm52g2h5ne

Searching Techniques over Encrypted Cloud Data

Azza A., Shereen Saleh, Passent Elkafrawy
2019 International Journal of Computer Applications  
In this paper a comparison between different kinds searchable encryption techniques according to the features of multiple keyword, amount of scale data, search complexity, accuracy, and, amount of storage  ...  This study focuses on different searching techniques over the encrypted data in cloud.  ...  Q.Liu scheme reduces the overhead in decryption for the user. In 2012, B.Long et al [9] proposed an improved public encryption with keyword search scheme.  ... 
doi:10.5120/ijca2019918676 fatcat:xhtgrgaqbnhqllebjady6xddiy

Implementation of E-Health Cloud System Using Timing Enabled Proxy Re-encryption function (Re-dtPECK)

U.Sarath priyan, V.D.Ambeth kumar
2017 International Journal of MC Square Scientific Research  
Thus, we introduce novel cryptographic primitive named as conjunctive keyword search with designated tester and timing enabled proxy reencryption function (Re-dtPECK), which is a time-dependent SE scheme  ...  The major feature is it supports the conjunctive keywords search and resist the keyword guessing attacks. By this, only the designated tester can provide exsistence to certain keywords.  ...  [4] proposed a idea and led to construction of Public Key Encryption with Conjunctive subset Keyword Search (PECSK) Scheme.  ... 
doi:10.20894/ijmsr.117.009.002.005 fatcat:y4c34gi6wvaqbfzqfoh356qyzy
« Previous Showing results 1 — 15 out of 1,473 results