Results 1 to 10 of about 10,393 (185)

Public Key Encryption with Keyword Search in Cloud: A Survey [PDF]

open access: yesEntropy, 2020
With the popularization of cloud computing, many business and individuals prefer to outsource their data to cloud in encrypted form to protect data confidentiality. However, how to search over encrypted data becomes a concern for users.
Yunhong Zhou   +4 more
doaj   +5 more sources

Public-Key Encryption With Keyword Search via Obfuscation [PDF]

open access: yesIEEE Access, 2019
Public-key encryption with keyword search (PEKS) enables users to search on encrypted data, which is applicable to the scenario of sharing data in the cloud storage. In this paper, we focus on how to construct a PEKS scheme via obfuscation.
Chengyu Hu   +3 more
doaj   +2 more sources

R-PEKS: RBAC Enabled PEKS for Secure Access of Cloud Data [PDF]

open access: yesIEEE Access, 2019
In the recent past, few works have been done by combining attribute-based access control with multi-user PEKS, i.e., public key encryption with keyword search.
K. Rajesh Rao   +4 more
doaj   +5 more sources

Public Key Encryption with Keyword Search Revisited [PDF]

open access: yes, 2008
The public key encryption with keyword search (PEKS) scheme, proposed by Boneh, Di Crescenzo, Ostrovsky and Persiano, enables one to search for encrypted keywords without compromising the security of the original data. In this paper, we address two important issues of a PEKS scheme, "removing secure channel" and "refreshing keywords", which have not ...
Joonsang Baek   +2 more
openaire   +4 more sources

Certificateless Public Key Authenticated Encryption with Keyword Search Achieving Stronger Security

open access: yesInformation, 2023
Transforming data into ciphertexts and storing them in the cloud database is a secure way to simplify data management. Public key encryption with keyword search (PEKS) is an important cryptographic primitive as it provides the ability to search for the ...
Jingwei Lu   +5 more
doaj   +1 more source

Trapdoor Privacy in Public Key Encryption With Keyword Search: A Review

open access: yesIEEE Access, 2022
The public key encryption with keyword search (PEKS) scheme allows searches to be performed over ciphertext by a server in a public-key setting. The PEKS scheme suffers from a major drawback which is keyword guessing attack.
Koon-Ming Chan   +3 more
doaj   +1 more source

Multi-Recipient encryption with keyword search without pairing for cloud storage

open access: yesJournal of Cloud Computing: Advances, Systems and Applications, 2022
With the rapid development of cloud computing technology and communication technology, cloud storage has become a tool used by people in daily life. Cloud storage service enables users to outsource data to cloud servers and retrieve desired document ...
Ningbin Yang   +3 more
doaj   +1 more source

An Efficient and Secure Public Key Authenticated Encryption With Keyword Search in the Logarithmic Time

open access: yesIEEE Access, 2021
Searchable encryption is an important cryptographic technique that achieves data security and keyword retrieval over encrypted data in cloud. In 2004, Boneh et.al proposed the first searchable encryption scheme based on asymmetric cryptography.
Lidong Han   +4 more
doaj   +1 more source

VR-PEKS: A Verifiable and Resistant to Keyword Guess Attack Public Key Encryption with Keyword Search Scheme

open access: yesApplied Sciences, 2023
Public key encryption with keyword search (PEKS) allows users to perform keyword searches of ciphertext on untrusted cloud storage servers, protecting data privacy while sharing data. However, it faces several security problems in practical applications.
Yingying Tang   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy