Results 1 to 10 of about 10,393 (185)
Public Key Encryption with Keyword Search in Cloud: A Survey [PDF]
With the popularization of cloud computing, many business and individuals prefer to outsource their data to cloud in encrypted form to protect data confidentiality. However, how to search over encrypted data becomes a concern for users.
Yunhong Zhou +4 more
doaj +5 more sources
Public-Key Encryption With Keyword Search via Obfuscation [PDF]
Public-key encryption with keyword search (PEKS) enables users to search on encrypted data, which is applicable to the scenario of sharing data in the cloud storage. In this paper, we focus on how to construct a PEKS scheme via obfuscation.
Chengyu Hu +3 more
doaj +2 more sources
R-PEKS: RBAC Enabled PEKS for Secure Access of Cloud Data [PDF]
In the recent past, few works have been done by combining attribute-based access control with multi-user PEKS, i.e., public key encryption with keyword search.
K. Rajesh Rao +4 more
doaj +5 more sources
Public Key Encryption with Keyword Search Revisited [PDF]
The public key encryption with keyword search (PEKS) scheme, proposed by Boneh, Di Crescenzo, Ostrovsky and Persiano, enables one to search for encrypted keywords without compromising the security of the original data. In this paper, we address two important issues of a PEKS scheme, "removing secure channel" and "refreshing keywords", which have not ...
Joonsang Baek +2 more
openaire +4 more sources
Revisit the Concept of PEKS: Problems and a Possible Solution [PDF]
Since Boneh et al. propose the concept, non-interactive\ud Public-key Encryption with Keyword Search (PEKS) has attracted lots of attention from cryptographers.
Tang, Qiang
core +17 more sources
Certificateless Public Key Authenticated Encryption with Keyword Search Achieving Stronger Security
Transforming data into ciphertexts and storing them in the cloud database is a secure way to simplify data management. Public key encryption with keyword search (PEKS) is an important cryptographic primitive as it provides the ability to search for the ...
Jingwei Lu +5 more
doaj +1 more source
Trapdoor Privacy in Public Key Encryption With Keyword Search: A Review
The public key encryption with keyword search (PEKS) scheme allows searches to be performed over ciphertext by a server in a public-key setting. The PEKS scheme suffers from a major drawback which is keyword guessing attack.
Koon-Ming Chan +3 more
doaj +1 more source
Multi-Recipient encryption with keyword search without pairing for cloud storage
With the rapid development of cloud computing technology and communication technology, cloud storage has become a tool used by people in daily life. Cloud storage service enables users to outsource data to cloud servers and retrieve desired document ...
Ningbin Yang +3 more
doaj +1 more source
Searchable encryption is an important cryptographic technique that achieves data security and keyword retrieval over encrypted data in cloud. In 2004, Boneh et.al proposed the first searchable encryption scheme based on asymmetric cryptography.
Lidong Han +4 more
doaj +1 more source
Public key encryption with keyword search (PEKS) allows users to perform keyword searches of ciphertext on untrusted cloud storage servers, protecting data privacy while sharing data. However, it faces several security problems in practical applications.
Yingying Tang +4 more
doaj +1 more source

