Trapdoor Privacy in Public Key Encryption With Keyword Search: A Review
The public key encryption with keyword search (PEKS) scheme allows searches to be performed over ciphertext by a server in a public-key setting. The PEKS scheme suffers from a major drawback which is keyword guessing attack.
Koon-Ming Chan +3 more
doaj +1 more source
A Survey on Public Key Encryption with Keyword Search: Taxonomy and Methods
Given the many benefits that cloud computing brings, organizations tend to outsource most of their data to reduce a large portion of their costs, but concern about the privacy of data is a major obstacle to outsourcing sensitive data.
M.H. Noorallahzade +2 more
doaj +1 more source
Generic Construction of Dual-Server Public Key Encryption With Keyword Search on Cloud Computing
Chen et al. indicated the inner keyword guessing attack coming from the low entropy of keywords, which eliminates the semantic security of most keyword search schemes.
Raylin Tso +4 more
doaj +1 more source
Design of College English Online Teaching Platform Based on Dual-Server PEKS Framework
To improve the English learning efficiency of college students and improve the performance of network teaching, the research on the college English network teaching platform is carried out under the dual-server PEKS framework.
Hua Wang
doaj +1 more source
How Can We Achieve Query Keyword Frequency Analysis in Privacy-Preserving Situations?
Recently, significant progress has been made in the field of public key encryption with keyword search (PEKS), with a focus on optimizing search methods and improving the security and efficiency of schemes.
Yiming Zhu +4 more
doaj +1 more source
An Efficient Public Key Searchable Encryption Scheme for Mobile Smart Terminal
With the wide application of the mobile smart terminals, the data privacy protection of the mobile smart terminals stored in the cloud is more and more important.
Ningbin Yang, Shumei Xu, Zhou Quan
doaj +1 more source
Verifiable Cloud Data Sharing Scheme that Supports Privacy Protection [PDF]
With the rapid development of mobile Internet technology, an increasing amount of data is stored on remote cloud servers, thereby increasing the search and sharing of sensitive data in outsourced cloud storage.To cope with these issues, a public-key ...
ZHANG Xiaojun, LIU Qing, ZHENG Shuang, WANG Xin, XUE Jingting, WANG Shixiong
doaj +1 more source
Public-Key Encryption with Delegated Search [PDF]
In public-key setting, Alice encrypts email with public key of Bob, so that only Bob will be able to learn contents of email. Consider scenario when computer of Alice is infected and unbeknown to Alice it also embeds malware into message.
Hartel, Pieter +3 more
core +3 more sources
Public-Key Encryption With Keyword Search via Obfuscation
Public-key encryption with keyword search (PEKS) enables users to search on encrypted data, which is applicable to the scenario of sharing data in the cloud storage. In this paper, we focus on how to construct a PEKS scheme via obfuscation.
Chengyu Hu +3 more
doaj +1 more source
Privacy-Preserving and Efficient Public Key Encryption with Keyword Search Based on CP-ABE in Cloud
In the area of searchable encryption, public key encryption with keyword search (PEKS) has been a critically important and promising technique which provides secure search over encrypted data in cloud computing. PEKS can protect user data privacy without
Yunhong Zhou, Shihui Zheng, Licheng Wang
doaj +1 more source

